UltraVNC revision 1211 has a stack buffer overflow vulnerability in VNC server code inside file transfer request handler, which can result in Denial of Service (DoS). This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1212.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf | Third Party Advisory |
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-023-ultravnc-stack-based-buffer-overflow/ | Third Party Advisory |
https://www.us-cert.gov/ics/advisories/icsa-20-161-06 | Third Party Advisory US Government Resource |
https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf | Third Party Advisory |
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-023-ultravnc-stack-based-buffer-overflow/ | Third Party Advisory |
https://www.us-cert.gov/ics/advisories/icsa-20-161-06 | Third Party Advisory US Government Resource |
Configurations
History
No history.
Information
Published : 2019-03-08 23:29
Updated : 2024-11-21 04:49
NVD link : CVE-2019-8276
Mitre link : CVE-2019-8276
CVE.ORG link : CVE-2019-8276
JSON object : View
Products Affected
uvnc
- ultravnc
siemens
- sinumerik_access_mymachine\/p2p
- sinumerik_pcu_base_win10_software\/ipc
- sinumerik_pcu_base_win7_software\/ipc