CVE-2008-0610
Published Feb 6, 2008
Last updated 12 years ago
Overview
- Description
- Stack-based buffer overflow in the ClientConnection::NegotiateProtocolVersion function in vncviewer/ClientConnection.cpp in vncviewer for UltraVNC 1.0.2 and 1.0.4 before 01252008, when in LISTENING mode or when using the DSM plugin, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a modified size value.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ultravnc:ultravnc:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C556A1A6-30ED-4988-B66B-CF823B297CF3" }, { "criteria": "cpe:2.3:a:ultravnc:ultravnc:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "700DA1B0-33D3-43A0-8080-733AD68CB903" }, { "criteria": "cpe:2.3:a:ultravnc:ultravnc:1.0.4_rc6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD272834-2BA4-446F-9851-8369FE620A20" }, { "criteria": "cpe:2.3:a:ultravnc:ultravnc:1.0.4_rc7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD36B455-5039-483A-B025-9FFB23844179" }, { "criteria": "cpe:2.3:a:ultravnc:ultravnc:1.0.4_rc8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26A7E323-FA94-450A-B5E3-DB2C65244215" } ], "operator": "OR" } ] } ]