First published: Fri Aug 23 2002(Updated: )
Vulnerability in VNC, TightVNC, and TridiaVNC allows local users to execute arbitrary code as LocalSystem by using the Win32 Messaging System to bypass the VNC GUI and access the "Add new clients" dialogue box.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TridiaVNC | =1.5.2 | |
UltraVNC | <=3.3.3_r9 | |
TightVNC | =1.2.0 | |
TightVNC | =1.2.1 | |
TridiaVNC | =1.5 | |
TridiaVNC | =1.5.1 | |
TridiaVNC | =1.5.4 | |
UltraVNC | =3.3.3_r7 | |
TightVNC | =1.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0971 is considered a critical vulnerability that allows local users to execute arbitrary code as LocalSystem.
To fix CVE-2002-0971, update to a patched version of the affected VNC distributions, specifically ensuring all software is at its latest version.
CVE-2002-0971 affects specific versions of TridiaVNC, TightVNC, and UltraVNC, including TightVNC 1.2.0, 1.2.1, and 1.2.5, among others.
Local users with access to the systems running affected versions of VNC can exploit CVE-2002-0971.
Exploitation of CVE-2002-0971 allows an attacker to run arbitrary code with SYSTEM privileges, potentially compromising the entire system.