CVE-2019-8272
9.8CRITICALUltraVNC revision 1211 has multiple off-by-one vulnerabilities in VNC server code, which can potentially result in code execution. This attack appears to be exploitable via network connectivity. These
Опубликовано: 3/8/2019Обновлено: 11/21/2024
Описание
UltraVNC revision 1211 has multiple off-by-one vulnerabilities in VNC server code, which can potentially result in code execution. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1212.
ИИ-АнализНа базе ИИ
Затронутые продукты
uvncultravnc
siemenssinumerik_access_mymachine\/p2p
siemenssinumerik_pcu_base_win10_software\/ipc
siemenssinumerik_pcu_base_win7_software\/ipc
Ссылки
- https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdfThird Party Advisory
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-019-ultravnc-off-by-one-error/Third Party Advisory
- https://www.us-cert.gov/ics/advisories/icsa-20-161-06Third Party AdvisoryUS Government Resource
- https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdfThird Party Advisory
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-019-ultravnc-off-by-one-error/Third Party Advisory
- https://www.us-cert.gov/ics/advisories/icsa-20-161-06Third Party AdvisoryUS Government Resource