CVE-2008-4770
vnc: vncviewer insufficient encoding value validation in CMsgReader::readRect
Severity Score
10.0
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The CMsgReader::readRect function in the VNC Viewer component in RealVNC VNC Free Edition 4.0 through 4.1.2, Enterprise Edition E4.0 through E4.4.2, and Personal Edition P4.0 through P4.4.2 allows remote VNC servers to execute arbitrary code via crafted RFB protocol data, related to "encoding type."
La función CMsgReader::readRect en el componente VNC Viewer en RealVNC VNC Free Edition v4.0 hasta v4.1.2, Enterprise Edition vE4.0 hasta vE4.4.2, y Personal Edition vP4.0 hasta vP4.4.2 permite a servidores remotos VNC ejecutar código de su elección mediante el protocolo de datos RFB manipulado, relacionado con "tipo codificado".
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2008-10-28 CVE Reserved
- 2009-01-16 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (19)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/32317 | Third Party Advisory | |
http://secunia.com/advisories/33689 | Third Party Advisory | |
http://secunia.com/advisories/34184 | Third Party Advisory | |
http://www.realvnc.com/pipermail/vnc-list/2008-November/059432.html | Mailing List | |
http://www.realvnc.com/products/free/4.1/release-notes.html | X_refsource_confirm | |
http://www.securityfocus.com/bid/31832 | Vdb Entry | |
http://www.securityfocus.com/bid/33263 | Vdb Entry | |
http://www.vupen.com/english/advisories/2008/2868 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45969 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47937 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9367 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://sunsolve.sun.com/search/document.do?assetkey=1-21-140455-01-1 | 2017-09-29 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Realvnc Search vendor "Realvnc" | Realvnc Search vendor "Realvnc" for product "Realvnc" | 4.0 Search vendor "Realvnc" for product "Realvnc" and version "4.0" | free |
Affected
| ||||||
Realvnc Search vendor "Realvnc" | Realvnc Search vendor "Realvnc" for product "Realvnc" | 4.1.2 Search vendor "Realvnc" for product "Realvnc" and version "4.1.2" | free |
Affected
| ||||||
Realvnc Search vendor "Realvnc" | Realvnc Search vendor "Realvnc" for product "Realvnc" | 4.4.2 Search vendor "Realvnc" for product "Realvnc" and version "4.4.2" | enterprise |
Affected
| ||||||
Realvnc Search vendor "Realvnc" | Realvnc Search vendor "Realvnc" for product "Realvnc" | e4.0 Search vendor "Realvnc" for product "Realvnc" and version "e4.0" | enterprise |
Affected
| ||||||
Realvnc Search vendor "Realvnc" | Realvnc Search vendor "Realvnc" for product "Realvnc" | p4.0 Search vendor "Realvnc" for product "Realvnc" and version "p4.0" | personal |
Affected
| ||||||
Realvnc Search vendor "Realvnc" | Realvnc Search vendor "Realvnc" for product "Realvnc" | p4.4.2 Search vendor "Realvnc" for product "Realvnc" and version "p4.4.2" | personal |
Affected
|