CVE-2019-8266
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
UltraVNC revision 1207 has multiple out-of-bounds access vulnerabilities connected with improper usage of ClientConnection::Copybuffer function in VNC client code, which can potentially result in code execution. This attack appears to be exploitable via network connectivity. User interaction is required to trigger these vulnerabilities. These vulnerabilities have been fixed in revision 1208.
UltraVNC, en su revisión 1207, tiene múltiples vulnerabilidades de acceso fuera de límites conectadas al uso incorrecto de la función ClientConnection::Copybuffer en el código VNC del cliente, lo que podría resultar en una ejecución de código. Este ataque parece ser explotable mediante la conectividad de red. Se requiere la interacción del usuario para desencadenar estas vulnerabilidades. Se han solucionado estas vulnerabilidades en la revisión 1208.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-02-12 CVE Reserved
- 2019-03-08 CVE Published
- 2024-08-31 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-125: Out-of-bounds Read
- CWE-787: Out-of-bounds Write
- CWE-788: Access of Memory Location After End of Buffer
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf | X_refsource_confirm | |
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-013-ultravnc-access-of-memory-location-after-end-of-buffer | Third Party Advisory | |
https://www.us-cert.gov/ics/advisories/icsa-20-161-06 | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|