CVE-2016-5673

UltraVNC Repeater before 1300 does not restrict destination IP addresses or TCP ports, which allows remote attackers to obtain open-proxy functionality by using a :: substring in between the IP address and port number.
References
Link Resource
http://www.kb.cert.org/vuls/id/735416 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/BLUU-A9WQVP Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/92348
http://www.kb.cert.org/vuls/id/735416 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/BLUU-A9WQVP Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/92348
Configurations

Configuration 1 (hide)

cpe:2.3:a:ultravnc:repeater:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:54

Type Values Removed Values Added
References () http://www.kb.cert.org/vuls/id/735416 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/735416 - Third Party Advisory, US Government Resource
References () http://www.kb.cert.org/vuls/id/BLUU-A9WQVP - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/BLUU-A9WQVP - Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/bid/92348 - () http://www.securityfocus.com/bid/92348 -

Information

Published : 2016-08-25 21:59

Updated : 2024-11-21 02:54


NVD link : CVE-2016-5673

Mitre link : CVE-2016-5673

CVE.ORG link : CVE-2016-5673


JSON object : View

Products Affected

ultravnc

  • repeater
CWE
CWE-284

Improper Access Control