Description
UltraVNC revision 1211 has multiple improper null termination vulnerabilities in VNC server code, which result in out-of-bound data being accessed by remote users. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1212.
Published: 2019-03-09
Score: 9.8 Critical
EPSS: 4.3% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-17673 UltraVNC revision 1211 has multiple improper null termination vulnerabilities in VNC server code, which result in out-of-bound data being accessed by remote users. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1212.
History

No history.

Subscriptions

Siemens Sinumerik Access Mymachine\/p2p Sinumerik Pcu Base Win10 Software\/ipc Sinumerik Pcu Base Win7 Software\/ipc
Uvnc Ultravnc
cve-icon MITRE

Status: PUBLISHED

Assigner: Kaspersky

Published:

Updated: 2024-09-17T03:12:37.776Z

Reserved: 2019-02-12T00:00:00.000Z

Link: CVE-2019-8275

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-03-08T23:29:00.890

Modified: 2024-11-21T04:49:37.823

Link: CVE-2019-8275

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses