Description
UltraVNC revision 1206 has multiple off-by-one vulnerabilities in VNC client code connected with improper usage of ClientConnection::ReadString function, which can potentially result code execution. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1207.
Published: 2019-03-09
Score: 9.8 Critical
EPSS: 1.4% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-17666 UltraVNC revision 1206 has multiple off-by-one vulnerabilities in VNC client code connected with improper usage of ClientConnection::ReadString function, which can potentially result code execution. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1207.
History

No history.

Subscriptions

Siemens Sinumerik Access Mymachine\/p2p Sinumerik Pcu Base Win10 Software\/ipc Sinumerik Pcu Base Win7 Software\/ipc
Uvnc Ultravnc
cve-icon MITRE

Status: PUBLISHED

Assigner: Kaspersky

Published:

Updated: 2024-09-17T01:16:16.319Z

Reserved: 2019-02-12T00:00:00.000Z

Link: CVE-2019-8268

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-03-08T23:29:00.623

Modified: 2024-11-21T04:49:36.873

Link: CVE-2019-8268

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses