UltraVNC revision 1211 has multiple off-by-one vulnerabilities in VNC server code, which can potentially result in code execution. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1212.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf | Third Party Advisory |
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-019-ultravnc-off-by-one-error/ | Third Party Advisory |
https://www.us-cert.gov/ics/advisories/icsa-20-161-06 | Third Party Advisory US Government Resource |
Configurations
History
No history.
Information
Published : 2019-03-08 23:29
Updated : 2024-02-04 20:20
NVD link : CVE-2019-8272
Mitre link : CVE-2019-8272
CVE.ORG link : CVE-2019-8272
JSON object : View
Products Affected
siemens
- sinumerik_access_mymachine\/p2p
- sinumerik_pcu_base_win7_software\/ipc
- sinumerik_pcu_base_win10_software\/ipc
uvnc
- ultravnc
CWE
CWE-193
Off-by-one Error