UltraVNC revision 1211 has a heap buffer overflow vulnerability in VNC server code inside file transfer handler, which can potentially result code execution. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1212.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf | Third Party Advisory |
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-018-ultravnc-heap-based-buffer-overflow/ | Third Party Advisory |
https://www.us-cert.gov/ics/advisories/icsa-20-161-06 | Third Party Advisory US Government Resource |
Configurations
History
No history.
Information
Published : 2019-03-08 23:29
Updated : 2024-02-28 17:08
NVD link : CVE-2019-8271
Mitre link : CVE-2019-8271
CVE.ORG link : CVE-2019-8271
JSON object : View
Products Affected
siemens
- sinumerik_pcu_base_win7_software\/ipc
- sinumerik_access_mymachine\/p2p
- sinumerik_pcu_base_win10_software\/ipc
uvnc
- ultravnc