Vulnerability CVE-2009-0388


Published: 2009-02-04   Modified: 2012-02-13

Description:
Multiple integer signedness errors in (1) UltraVNC 1.0.2 and 1.0.5 and (2) TightVnc 1.3.9 allow remote VNC servers to cause a denial of service (heap corruption and application crash) or possibly execute arbitrary code via a large length value in a message, related to the (a) ClientConnection::CheckBufferSize and (b) ClientConnection::CheckFileZipBufferSize functions in ClientConnection.cpp.

See advisories in our WLB2 database:
Topic
Author
Date
High
CORE-2008-1009 - VNC Multiple Integer Overflows
CORE
07.02.2009

Type:

CWE-189

(Numeric Errors)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Ultravnc -> Ultravnc 
Tightvnc -> Tightvnc 

 References:
http://forum.ultravnc.info/viewtopic.php?t=14654
http://vnc-tight.svn.sourceforge.net/viewvc/vnc-tight?view=rev&revision=3564
http://www.coresecurity.com/content/vnc-integer-overflows
http://www.securityfocus.com/archive/1/500632/100/0/threaded
http://www.securityfocus.com/bid/33568
http://www.vupen.com/english/advisories/2009/0321
http://www.vupen.com/english/advisories/2009/0322
https://www.exploit-db.com/exploits/7990
https://www.exploit-db.com/exploits/8024

Copyright 2024, cxsecurity.com

 

Back to Top