First published: Thu Aug 25 2016(Updated: )
UltraVNC Repeater before 1300 does not restrict destination IP addresses or TCP ports, which allows remote attackers to obtain open-proxy functionality by using a :: substring in between the IP address and port number.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
UltraVNC | <=1201 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5673 is classified as a medium severity vulnerability due to its potential for exposing systems to unauthorized proxy access.
To fix CVE-2016-5673, upgrade UltraVNC Repeater to version 1300 or later, which includes necessary restrictions on destination IP addresses and TCP ports.
CVE-2016-5673 can be exploited by remote attackers to establish open-proxy functionality through malformed IP address and port configurations.
The potential impacts of CVE-2016-5673 include unauthorized access to internal networks and the ability to use the vulnerable machine as a proxy.
CVE-2016-5673 affects UltraVNC Repeater versions prior to 1300.