CVE-2009-0388

UltraVNC 1.0.2-1.0.5 & TightVnc 1.3.9 - DoS/Code Injection

Title source: llm
STIX 2.1

Description

Multiple integer signedness errors in (1) UltraVNC 1.0.2 and 1.0.5 and (2) TightVnc 1.3.9 allow remote VNC servers to cause a denial of service (heap corruption and application crash) or possibly execute arbitrary code via a large length value in a message, related to the (a) ClientConnection::CheckBufferSize and (b) ClientConnection::CheckFileZipBufferSize functions in ClientConnection.cpp.

Exploits (2)

exploitdb WORKING POC VERIFIED
by desi · pythondoswindows
https://www.exploit-db.com/exploits/8024
exploitdb WORKING POC VERIFIED
by Andres Luksenberg · pythondoswindows
https://www.exploit-db.com/exploits/7990

References (10)

Core 10
Core References
Various Sources x_refsource_confirm
http://forum.ultravnc.info/viewtopic.php?t=14654
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2009/0321
Exploit, Patch vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/33568
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/500632/100/0/threaded
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/8024
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2009/0322
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/7990
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/33807

Scores

EPSS 0.4832
EPSS Percentile 97.8%

Details

CWE
CWE-189
Status published
Products (3)
tightvnc/tightvnc 1.3.9
ultravnc/ultravnc 1.0.2
ultravnc/ultravnc 1.0.5
Published Feb 04, 2009
Tracked Since Feb 18, 2026