Overview
UltraVNC viewer contains a buffer overflow vulnerability. If exploited, this vulnerability may allow an attacker to execute arbitrary code.
Description
UltraVNC viewer is a remote desktop application that allows a user to control compatible VNC servers. The UltraVNC viewer includes a listen mode that accepts connections from remote hosts. The UltraVNC viewer contains a buffer overflow vulnerability. This vulnerability may be triggered by sending a malformed packet during the protocol negotiation phase of a VNC session. |
Impact
A remote, unauthenticated attacker may be able to execute arbitrary code. |
Solution
Upgrade |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://forum.ultravnc.info/viewtopic.php?t=11850
- http://forum.ultravnc.info/viewtopic.php?p=43529
- http://secunia.com/advisories/28747/
- http://www.microsoft.com/technet/security/smallbusiness/prodtech/windowsxp/cfgfwall.mspx
- http://technet2.microsoft.com/WindowsVista/en/library/19b429b3-c32b-4cbd-ae2a-8e77f2ced35c1033.mspx?mfr=true
- http://forum.ultravnc.info/viewtopic.php?t=6005&highlight=5400
Acknowledgements
Thanks to the UltraVNC team and Secunia for information that was used in this report.
This document was written by Ryan Giobbi.
Other Information
CVE IDs: | CVE-2008-0610 |
Severity Metric: | 12.86 |
Date Public: | 2008-02-01 |
Date First Published: | 2008-03-15 |
Date Last Updated: | 2008-03-17 01:22 UTC |
Document Revision: | 31 |