UltraVNC revision 1198 has a heap buffer overflow vulnerability in VNC client code which results code execution. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1199.
References
| Link | Resource |
|---|---|
| https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf | Third Party Advisory |
| https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-004-ultravnc-heap-based-buffer-overflow/ | Third Party Advisory |
| https://www.us-cert.gov/ics/advisories/icsa-20-161-06 | Third Party Advisory US Government Resource |
| https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf | Third Party Advisory |
| https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-004-ultravnc-heap-based-buffer-overflow/ | Third Party Advisory |
| https://www.us-cert.gov/ics/advisories/icsa-20-161-06 | Third Party Advisory US Government Resource |
Configurations
History
No history.
Information
Published : 2019-03-05 15:29
Updated : 2024-11-21 04:49
NVD link : CVE-2019-8258
Mitre link : CVE-2019-8258
CVE.ORG link : CVE-2019-8258
JSON object : View
Products Affected
uvnc
- ultravnc
siemens
- sinumerik_pcu_base_win10_software\/ipc
- sinumerik_access_mymachine\/p2p
- sinumerik_pcu_base_win7_software\/ipc
