Lucene search

K
saintSAINT CorporationSAINT:03D42E1E88BD5AE190FEC77B881495EC
HistoryFeb 20, 2009 - 12:00 a.m.

UltraVNC ClientConnection integer overflow

2009-02-2000:00:00
SAINT Corporation
download.saintcorporation.com
14

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.899

Percentile

98.8%

Added: 02/20/2009
CVE: CVE-2009-0388
BID: 33568

Background

UltraVNC is free software for remote desktop access.

Problem

Multiple integer overflow vulnerabilities in the **ClientConnection** class allow command execution when a user connects to a VNC server which sends a message with a large length value.

Resolution

Upgrade to UltraVNC Viewer 1.0.5.4 or higher.

References

<http://www.securityfocus.com/archive/1/500632&gt;

Limitations

Exploit works on UltraVNC 1.0.5.3 and requires a user to connect to the exploit server.

Due to the nature of the vulnerability, the success of this exploit may depend on the state of the target system.

Platforms

Windows

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.899

Percentile

98.8%