UltraVNC Repeater before 1300 does not restrict destination IP addresses or TCP ports, which allows remote attackers to obtain open-proxy functionality by using a :: substring in between the IP address and port number.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/735416 | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/BLUU-A9WQVP | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/92348 | |
http://www.kb.cert.org/vuls/id/735416 | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/BLUU-A9WQVP | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/92348 |
Configurations
History
21 Nov 2024, 02:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kb.cert.org/vuls/id/735416 - Third Party Advisory, US Government Resource | |
References | () http://www.kb.cert.org/vuls/id/BLUU-A9WQVP - Third Party Advisory, US Government Resource | |
References | () http://www.securityfocus.com/bid/92348 - |
Information
Published : 2016-08-25 21:59
Updated : 2024-11-21 02:54
NVD link : CVE-2016-5673
Mitre link : CVE-2016-5673
CVE.ORG link : CVE-2016-5673
JSON object : View
Products Affected
ultravnc
- repeater
CWE
CWE-284
Improper Access Control