Overview
UltraVNC repeater versions prior to ultravnc_repeater_1300 do not restrict usage by IP address by default and cannot restrict by ports, which may be leveraged to induce connections to arbitrary hosts using any port.
Description
CWE-16: Configuration - CVE-2016-5673 UltraVNC repeater acts as a proxy to route remote desktop VNC connections. IP addresses are not restricted in default configurations, and ports cannot be selectively restricted. Consequently, in a default installation, a repeater can be caused to initiate connections to arbitrary hosts using any port. To initiate a connection to a common web service, for instance, an attacker may request a connection to <IP>::<80><padding>, where padding consists of null bytes and the request length is 250 bytes. |
Impact
A remote, unauthenticated attacker may induce a default-configured repeater to initiate connections to arbitrary hosts and services. |
Solution
Update repeater configuration |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 5 | AV:N/AC:L/Au:N/C:N/I:P/A:N |
Temporal | 3.9 | E:POC/RL:OF/RC:C |
Environmental | 1.0 | CDP:ND/TD:L/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Yonathan Klijnsma and Dan Tentler for reporting this vulnerability.
This document was written by Joel Land.
Other Information
CVE IDs: | CVE-2016-5673 |
Date Public: | 2016-08-06 |
Date First Published: | 2016-08-08 |
Date Last Updated: | 2016-08-08 14:01 UTC |
Document Revision: | 22 |