Page 6 of 26 results (0.004 seconds)

CVSS: 9.3EPSS: 33%CPEs: 5EXPL: 3

Stack-based buffer overflow in the ClientConnection::NegotiateProtocolVersion function in vncviewer/ClientConnection.cpp in vncviewer for UltraVNC 1.0.2 and 1.0.4 before 01252008, when in LISTENING mode or when using the DSM plugin, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a modified size value. Desbordamiento de búfer basado en pila en la función ClientConnection::NegotiateProtocolVersion en vncviewer/ClientConnection.cpp de vncviewer para UltraVNC 1.0.2 y 1.0.4 antes de 01252008. Cuando se está en modo ESCUCHA (LISTENING) o cuando se utiliza el plugin DSM, permite a atacantes remotos ejecutar código de su elección o provocar una denegación de servicio (caída) a través de un valor de tamaño modificado. • https://www.exploit-db.com/exploits/18666 http://forum.ultravnc.info/viewtopic.php?t=11850 http://secunia.com/advisories/28747 http://sourceforge.net/project/shownotes.php?release_id=571174&group_id=63887 http://ultravnc.svn.sourceforge.net/viewvc/ultravnc/UltraVNC%20Project%20Root/UltraVNC/vncviewer/ClientConnection.cpp?sortby=date&r1=169&r2=168&pathrev=169 http://www.exploit-db.com/exploits/18666 http://www.kb.cert.org/vuls/id/721460 http://www.securityfocus.com/bid/27561 http:// • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •