Description
UltraVNC revision 1211 has a heap buffer overflow vulnerability in VNC server code inside file transfer handler, which can potentially result code execution. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1212.
References (3)
Core 3
Core References
Third Party Advisory x_refsource_misc
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-018-ultravnc-heap-based-buffer-overflow/
Third Party Advisory x_refsource_confirm
https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf
Third Party Advisory, US Government Resource x_refsource_misc
https://www.us-cert.gov/ics/advisories/icsa-20-161-06
Scores
CVSS v3
9.8
EPSS
0.0400
EPSS Percentile
88.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-122
CWE-787
Status
published
Products (4)
siemens/sinumerik_access_mymachine\/p2p
< 4.8
siemens/sinumerik_pcu_base_win10_software\/ipc
< 14.00
siemens/sinumerik_pcu_base_win7_software\/ipc
< 12.01
uvnc/ultravnc
< 1.2.2.3
Published
Mar 08, 2019
Tracked Since
Feb 18, 2026