- Description
- UltraVNC revision 1198 contains multiple memory leaks (CWE-655) in VNC client code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1199.
- Source
- vulnerability@kaspersky.com
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:uvnc:ultravnc:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "555D034F-3D64-4ED1-9B63-F8D59199E99C",
"versionEndExcluding": "1.2.2.3"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:siemens:sinumerik_access_mymachine\\/p2p:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D9345335-DF62-4472-93CD-E2C85453F91E",
"versionEndExcluding": "4.8"
},
{
"criteria": "cpe:2.3:a:siemens:sinumerik_pcu_base_win10_software\\/ipc:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7498412D-79FD-43FE-AD9B-5820FB5CF7D8",
"versionEndExcluding": "14.00"
},
{
"criteria": "cpe:2.3:a:siemens:sinumerik_pcu_base_win7_software\\/ipc:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1F603341-03C5-46CA-8A74-EC5A50135194",
"versionEndIncluding": "12.01"
}
],
"operator": "OR"
}
]
}
]