Lucene search

K
saintSAINT CorporationSAINT:8762C0BCA40A528F01D935D7B73F5FF4
HistoryFeb 20, 2009 - 12:00 a.m.

UltraVNC ClientConnection integer overflow

2009-02-2000:00:00
SAINT Corporation
my.saintcorporation.com
13

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.899 High

EPSS

Percentile

98.7%

Added: 02/20/2009
CVE: CVE-2009-0388
BID: 33568

Background

UltraVNC is free software for remote desktop access.

Problem

Multiple integer overflow vulnerabilities in the **ClientConnection** class allow command execution when a user connects to a VNC server which sends a message with a large length value.

Resolution

Upgrade to UltraVNC Viewer 1.0.5.4 or higher.

References

<http://www.securityfocus.com/archive/1/500632&gt;

Limitations

Exploit works on UltraVNC 1.0.5.3 and requires a user to connect to the exploit server.

Due to the nature of the vulnerability, the success of this exploit may depend on the state of the target system.

Platforms

Windows

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.899 High

EPSS

Percentile

98.7%