CVE-2022-41975
https://notcve.org/view.php?id=CVE-2022-41975
RealVNC VNC Server before 6.11.0 and VNC Viewer before 6.22.826 on Windows allow local privilege escalation via MSI installer Repair mode. vRealVNC VNC Server versiones anteriores a 6.11.0 y VNC Viewer versiones anteriores a 6.22.826 en Windows, permiten una escalada de privilegios local por medio del modo de reparación del instalador MSI • https://help.realvnc.com/hc/en-us/articles/360002253138-Release-Notes#vnc-server-6-11-0-released-0-2 •
CVE-2022-27502
https://notcve.org/view.php?id=CVE-2022-27502
RealVNC VNC Server 6.9.0 through 5.1.0 for Windows allows local privilege escalation because an installer repair operation executes %TEMP% files as SYSTEM. RealVNC VNC Server versiones 6.9.0 hasta 5.1.0 para Windows, permite una escalada de privilegios local porque una operación de reparación del instalador ejecuta archivos %TEMP% como SYSTEM • https://github.com/alirezac0/CVE-2022-27502 https://help.realvnc.com/hc/en-us/articles/360002478311-Are-there-any-known-security-vulnerabilities-#cve-2008-4770-moderate-%E2%80%94-only-affects-vnc-viewer--0-1 https://realvnc.com •
CVE-2021-41380
https://notcve.org/view.php?id=CVE-2021-41380
RealVNC Viewer 6.21.406 allows remote VNC servers to cause a denial of service (application crash) via crafted RFB protocol data. NOTE: It is asserted that this issue requires social engineering a user into connecting to a fake VNC Server. The VNC Viewer application they are using will then hang, until terminated, but no memory leak occurs - the resources are freed once the hung process is terminated and the resource usage is constant during the hang. Only the process that is connected to the fake Server is affected. This is an application bug, not a security issue ** EN DISPUTA ** RealVNC Viewer 6.21.406 permite que los servidores VNC remotos provoquen una denegación de servicio (caída de la aplicación) a través de datos de protocolo RFB manipulados. • https://gist.github.com/totaam/a90f2bb40f5b693ccec0ae903d021b03 • CWE-20: Improper Input Validation •
CVE-2013-6886
https://notcve.org/view.php?id=CVE-2013-6886
RealVNC VNC 5.0.6 on Mac OS X, Linux, and UNIX allows local users to gain privileges via a crafted argument to the (1) vncserver, (2) vncserver-x11, or (3) Xvnc helper. RealVNC VNC 5.0.6 en Mac OS X, Linux y UNIX permite a usuarios locales conseguir privilegios a través de un argumento diseñado al (1) vncserver, (2) vncserver-x11, o (3) Xvnc helper • http://www.realvnc.com/products/vnc/documentation/5.0/release-notes • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2008-4770 – vnc: vncviewer insufficient encoding value validation in CMsgReader::readRect
https://notcve.org/view.php?id=CVE-2008-4770
The CMsgReader::readRect function in the VNC Viewer component in RealVNC VNC Free Edition 4.0 through 4.1.2, Enterprise Edition E4.0 through E4.4.2, and Personal Edition P4.0 through P4.4.2 allows remote VNC servers to execute arbitrary code via crafted RFB protocol data, related to "encoding type." La función CMsgReader::readRect en el componente VNC Viewer en RealVNC VNC Free Edition v4.0 hasta v4.1.2, Enterprise Edition vE4.0 hasta vE4.4.2, y Personal Edition vP4.0 hasta vP4.4.2 permite a servidores remotos VNC ejecutar código de su elección mediante el protocolo de datos RFB manipulado, relacionado con "tipo codificado". • http://secunia.com/advisories/32317 http://secunia.com/advisories/33689 http://secunia.com/advisories/34184 http://sunsolve.sun.com/search/document.do?assetkey=1-21-140455-01-1 http://sunsolve.sun.com/search/document.do?assetkey=1-26-248526-1 http://www.gentoo.org/security/en/glsa/glsa-200903-17.xml http://www.realvnc.com/pipermail/vnc-list/2008-November/059432.html http://www.realvnc.com/products/free/4.1/release-notes.html http://www.realvnc.com/products/upgrade.h • CWE-20: Improper Input Validation •