First published: Thu Apr 06 2006(Updated: )
Multiple buffer overflows in (a) UltraVNC (aka Ultr@VNC) 1.0.1 and earlier and (b) tabbed_viewer 1.29 (1) allow user-assisted remote attackers to execute arbitrary code via a malicious server that sends a long string to a client that connects on TCP port 5900, which triggers an overflow in Log::ReallyPrint; and (2) allow remote attackers to cause a denial of service (server crash) via a long HTTP GET request to TCP port 5800, which triggers an overflow in VNCLog::ReallyPrint.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
UltraVNC VNC Viewer | =1.29 | |
UltraVNC VNC Viewer | =1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1652 is classified as a high severity vulnerability due to its potential for arbitrary code execution.
To fix CVE-2006-1652, update UltraVNC to version 1.0.2 or later, which addresses the buffer overflow vulnerabilities.
CVE-2006-1652 affects UltraVNC version 1.0.1 and earlier, as well as tabbed_viewer version 1.29.
CVE-2006-1652 allows user-assisted remote attackers to execute arbitrary code by sending malicious data to vulnerable clients.
CVE-2006-1652 is concerning because it can be exploited by remote attackers, compromising user systems with minimal user interaction required.