UltraVNC revision 1211 has a heap buffer overflow vulnerability in VNC server code inside file transfer offer handler, which can potentially in result code execution. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1212.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf | Third Party Advisory |
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-021-ultravnc-heap-based-buffer-overflow/ | Third Party Advisory |
https://www.us-cert.gov/ics/advisories/icsa-20-161-06 | Third Party Advisory US Government Resource |
https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf | Third Party Advisory |
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-021-ultravnc-heap-based-buffer-overflow/ | Third Party Advisory |
https://www.us-cert.gov/ics/advisories/icsa-20-161-06 | Third Party Advisory US Government Resource |
Configurations
History
No history.
Information
Published : 2019-03-08 23:29
Updated : 2024-11-21 04:49
NVD link : CVE-2019-8274
Mitre link : CVE-2019-8274
CVE.ORG link : CVE-2019-8274
JSON object : View
Products Affected
uvnc
- ultravnc
siemens
- sinumerik_access_mymachine\/p2p
- sinumerik_pcu_base_win10_software\/ipc
- sinumerik_pcu_base_win7_software\/ipc