Description
Multiple integer signedness errors in (1) UltraVNC 1.0.2 and 1.0.5 and (2) TightVnc 1.3.9 allow remote VNC servers to cause a denial of service (heap corruption and application crash) or possibly execute arbitrary code via a large length value in a message, related to the (a) ClientConnection::CheckBufferSize and (b) ClientConnection::CheckFileZipBufferSize functions in ClientConnection.cpp.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Andres Luksenberg · pythondoswindows
https://www.exploit-db.com/exploits/7990
References (10)
Core 10
Core References
Various Sources x_refsource_confirm
http://forum.ultravnc.info/viewtopic.php?t=14654
Product x_refsource_confirm
http://vnc-tight.svn.sourceforge.net/viewvc/vnc-tight?view=rev&revision=3564
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2009/0321
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/33568
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/500632/100/0/threaded
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/8024
Exploit x_refsource_misc
http://www.coresecurity.com/content/vnc-integer-overflows
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2009/0322
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/7990
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/33807
Scores
EPSS
0.4832
EPSS Percentile
97.8%
Details
CWE
CWE-189
Status
published
Products (3)
tightvnc/tightvnc
1.3.9
ultravnc/ultravnc
1.0.2
ultravnc/ultravnc
1.0.5
Published
Feb 04, 2009
Tracked Since
Feb 18, 2026