UltraVNC revision 1211 has multiple improper null termination vulnerabilities in VNC server code, which result in out-of-bound data being accessed by remote users. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1212.
References
Link | Resource |
---|---|
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-022-ultravnc-improper-null-termination/ | Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf | Third Party Advisory |
https://www.us-cert.gov/ics/advisories/icsa-20-161-06 | Third Party Advisory US Government Resource |
https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf | |
https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf | |
https://us-cert.cisa.gov/ics/advisories/icsa-21-131-11 |
Configurations
Information
Published : 2019-03-08 15:29
Updated : 2021-06-28 06:15
NVD link : CVE-2019-8275
Mitre link : CVE-2019-8275
JSON object : View
CWE
Products Affected
siemens
- sinumerik_pcu_base_win10_software\/ipc
- sinumerik_access_mymachine\/p2p
- sinumerik_pcu_base_win7_software\/ipc
uvnc
- ultravnc