First published: Fri Mar 09 2001(Updated: )
Buffer overflow in AT&T WinVNC (Virtual Network Computing) server 3.3.3r7 and earlier allows remote attackers to execute arbitrary commands via a long HTTP GET request when the DebugLevel registry key is greater than 0.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
AT&T WinVNC | <=3.3.3r7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0168 has a high severity rating due to its potential for remote code execution.
To fix CVE-2001-0168, upgrade to a version of AT&T WinVNC that is later than 3.3.3r7.
CVE-2001-0168 is caused by a buffer overflow vulnerability in the AT&T WinVNC server.
Users running AT&T WinVNC versions 3.3.3r7 and earlier with DebugLevel registry key set above 0 are affected.
Attackers can execute arbitrary commands on the server due to the buffer overflow vulnerability present in CVE-2001-0168.