UltraVNC revision 1211 has multiple off-by-one vulnerabilities in VNC server code, which can potentially result in code execution. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1212.
References
Link | Resource |
---|---|
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-019-ultravnc-off-by-one-error/ | Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf | Third Party Advisory |
https://www.us-cert.gov/ics/advisories/icsa-20-161-06 | Third Party Advisory US Government Resource |
Configurations
Information
Published : 2019-03-08 15:29
Updated : 2020-10-22 09:46
NVD link : CVE-2019-8272
Mitre link : CVE-2019-8272
JSON object : View
CWE
CWE-193
Off-by-one Error
Products Affected
siemens
- sinumerik_pcu_base_win10_software\/ipc
- sinumerik_access_mymachine\/p2p
- sinumerik_pcu_base_win7_software\/ipc
uvnc
- ultravnc