UltraVNC revision 1206 has multiple off-by-one vulnerabilities in VNC client code connected with improper usage of ClientConnection::ReadString function, which can potentially result code execution. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1207.
References
Link | Resource |
---|---|
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-015-ultravnc-off-by-one-error/ | Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf | Third Party Advisory |
https://www.us-cert.gov/ics/advisories/icsa-20-161-06 | Third Party Advisory US Government Resource |
Configurations
Information
Published : 2019-03-08 15:29
Updated : 2020-10-19 10:56
NVD link : CVE-2019-8268
Mitre link : CVE-2019-8268
JSON object : View
CWE
CWE-193
Off-by-one Error
Products Affected
siemens
- sinumerik_pcu_base_win10_software\/ipc
- sinumerik_access_mymachine\/p2p
- sinumerik_pcu_base_win7_software\/ipc
uvnc
- ultravnc