2 results (0.009 seconds)

CVSS: 10.0EPSS: 7%CPEs: 6EXPL: 0

The CMsgReader::readRect function in the VNC Viewer component in RealVNC VNC Free Edition 4.0 through 4.1.2, Enterprise Edition E4.0 through E4.4.2, and Personal Edition P4.0 through P4.4.2 allows remote VNC servers to execute arbitrary code via crafted RFB protocol data, related to "encoding type." La función CMsgReader::readRect en el componente VNC Viewer en RealVNC VNC Free Edition v4.0 hasta v4.1.2, Enterprise Edition vE4.0 hasta vE4.4.2, y Personal Edition vP4.0 hasta vP4.4.2 permite a servidores remotos VNC ejecutar código de su elección mediante el protocolo de datos RFB manipulado, relacionado con "tipo codificado". • http://secunia.com/advisories/32317 http://secunia.com/advisories/33689 http://secunia.com/advisories/34184 http://sunsolve.sun.com/search/document.do?assetkey=1-21-140455-01-1 http://sunsolve.sun.com/search/document.do?assetkey=1-26-248526-1 http://www.gentoo.org/security/en/glsa/glsa-200903-17.xml http://www.realvnc.com/pipermail/vnc-list/2008-November/059432.html http://www.realvnc.com/products/free/4.1/release-notes.html http://www.realvnc.com/products/upgrade.h • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 2

RealVNC 4.0 and earlier allows remote attackers to cause a denial of service (crash) via a large number of connections to port 5900. • http://marc.info/?l=bugtraq&m=109346198700529&w=2 http://secunia.com/advisories/13143 http://www.securityfocus.com/bid/11048 https://exchange.xforce.ibmcloud.com/vulnerabilities/17123 •