← Retour aux CVEs
CVE-2019-8268
CRITICAL9.8
Description
UltraVNC revision 1206 has multiple off-by-one vulnerabilities in VNC client code connected with improper usage of ClientConnection::ReadString function, which can potentially result code execution. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1207.
Details CVE
Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie3/8/2019
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
siemens:sinumerik_access_mymachine\/p2psiemens:sinumerik_pcu_base_win10_software\/ipcsiemens:sinumerik_pcu_base_win7_software\/ipcuvnc:ultravnc
Faiblesses (CWE)
CWE-193CWE-193
References
https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf(vulnerability@kaspersky.com)
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-015-ultravnc-off-by-one-error/(vulnerability@kaspersky.com)
https://www.us-cert.gov/ics/advisories/icsa-20-161-06(vulnerability@kaspersky.com)
https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-015-ultravnc-off-by-one-error/(af854a3a-2127-422b-91ae-364da2661108)
https://www.us-cert.gov/ics/advisories/icsa-20-161-06(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.