Lucene search

K
kasperskyKaspersky LabKLA11371
HistoryFeb 04, 2009 - 12:00 a.m.

KLA11371 ACE vulnerability in TightVNC

2009-02-0400:00:00
Kaspersky Lab
threats.kaspersky.com
90

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

8.3

Confidence

High

EPSS

0.899

Percentile

98.8%

Integer signing errors were found in TightVNC. By exploiting this vulnerability malicious users can cause denial of service or possibly execute arbitrary code. This vulnerability can be exploited remotely via a specially designed message.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Related products

TightVNC

TightVNC-Viewer

TightVNC-Server

CVE list

CVE-2009-0388 critical

Solution

Update to latest version

TightVNC

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

Affected Products

  • UltraVNC 1.0.2UltraVNC 1.0.5TightVnc 1.3.9

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

8.3

Confidence

High

EPSS

0.899

Percentile

98.8%