Lucene search

K
saintSAINT CorporationSAINT:882A533D878F458BCFABF8F72F8D2A8D
HistoryFeb 20, 2009 - 12:00 a.m.

UltraVNC ClientConnection integer overflow

2009-02-2000:00:00
SAINT Corporation
download.saintcorporation.com
18

EPSS

0.899

Percentile

98.8%

Added: 02/20/2009
CVE: CVE-2009-0388
BID: 33568

Background

UltraVNC is free software for remote desktop access.

Problem

Multiple integer overflow vulnerabilities in the **ClientConnection** class allow command execution when a user connects to a VNC server which sends a message with a large length value.

Resolution

Upgrade to UltraVNC Viewer 1.0.5.4 or higher.

References

<http://www.securityfocus.com/archive/1/500632&gt;

Limitations

Exploit works on UltraVNC 1.0.5.3 and requires a user to connect to the exploit server.

Due to the nature of the vulnerability, the success of this exploit may depend on the state of the target system.

Platforms

Windows