- Description
- Stack-based buffer overflow in the ClientConnection::NegotiateProtocolVersion function in vncviewer/ClientConnection.cpp in vncviewer for UltraVNC 1.0.2 and 1.0.4 before 01252008, when in LISTENING mode or when using the DSM plugin, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a modified size value.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
- nvd@nist.gov
- CWE-119
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ultravnc:ultravnc:1.0.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C556A1A6-30ED-4988-B66B-CF823B297CF3"
},
{
"criteria": "cpe:2.3:a:ultravnc:ultravnc:1.0.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "700DA1B0-33D3-43A0-8080-733AD68CB903"
},
{
"criteria": "cpe:2.3:a:ultravnc:ultravnc:1.0.4_rc6:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FD272834-2BA4-446F-9851-8369FE620A20"
},
{
"criteria": "cpe:2.3:a:ultravnc:ultravnc:1.0.4_rc7:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FD36B455-5039-483A-B025-9FFB23844179"
},
{
"criteria": "cpe:2.3:a:ultravnc:ultravnc:1.0.4_rc8:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "26A7E323-FA94-450A-B5E3-DB2C65244215"
}
],
"operator": "OR"
}
]
}
]