CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
97.1%
Stack-based buffer overflow in the ClientConnection::NegotiateProtocolVersion function in vncviewer/ClientConnection.cpp in vncviewer for UltraVNC 1.0.2 and 1.0.4 before 01252008, when in LISTENING mode or when using the DSM plugin, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a modified size value.
Vendor | Product | Version | CPE |
---|---|---|---|
ultravnc | ultravnc | 1.0.2 | cpe:2.3:a:ultravnc:ultravnc:1.0.2:*:*:*:*:*:*:* |
ultravnc | ultravnc | 1.0.4 | cpe:2.3:a:ultravnc:ultravnc:1.0.4:*:*:*:*:*:*:* |
ultravnc | ultravnc | 1.0.4_rc6 | cpe:2.3:a:ultravnc:ultravnc:1.0.4_rc6:*:*:*:*:*:*:* |
ultravnc | ultravnc | 1.0.4_rc7 | cpe:2.3:a:ultravnc:ultravnc:1.0.4_rc7:*:*:*:*:*:*:* |
ultravnc | ultravnc | 1.0.4_rc8 | cpe:2.3:a:ultravnc:ultravnc:1.0.4_rc8:*:*:*:*:*:*:* |
forum.ultravnc.info/viewtopic.php?t=11850
secunia.com/advisories/28747
sourceforge.net/project/shownotes.php?release_id=571174&group_id=63887
ultravnc.svn.sourceforge.net/viewvc/ultravnc/UltraVNC%20Project%20Root/UltraVNC/vncviewer/ClientConnection.cpp?sortby=date&r1=169&r2=168&pathrev=169
www.exploit-db.com/exploits/18666
www.kb.cert.org/vuls/id/721460
www.securityfocus.com/bid/27561
www.securitytracker.com/id?1019293
www.vupen.com/english/advisories/2008/0392