- Description
- Multiple integer signedness errors in (1) UltraVNC 1.0.2 and 1.0.5 and (2) TightVnc 1.3.9 allow remote VNC servers to cause a denial of service (heap corruption and application crash) or possibly execute arbitrary code via a large length value in a message, related to the (a) ClientConnection::CheckBufferSize and (b) ClientConnection::CheckFileZipBufferSize functions in ClientConnection.cpp.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
- nvd@nist.gov
- CWE-189
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tightvnc:tightvnc:1.3.9:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6E472222-224B-41BD-A788-F6D6AF96430B"
},
{
"criteria": "cpe:2.3:a:ultravnc:ultravnc:1.0.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C556A1A6-30ED-4988-B66B-CF823B297CF3"
},
{
"criteria": "cpe:2.3:a:ultravnc:ultravnc:1.0.5:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "835FD162-1BE0-43C6-93A5-1E450505D2A9"
}
],
"operator": "OR"
}
]
}
]