First published: Fri Mar 01 2019(Updated: )
UltraVNC revision 1198 has a heap buffer overflow vulnerability in VNC client code which results code execution. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1199.
Credit: vulnerability@kaspersky.com vulnerability@kaspersky.com
Affected Software | Affected Version | How to fix |
---|---|---|
UltraVNC | <1.2.2.3 | |
Siemens Sinumerik Access MyMachine/P2P | <4.8 | |
Siemens Sinumerik PCU Base Win10 Software | <14.00 | |
Siemens Sinumerik PCU Base Win7 Software/IPC | <=12.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8258 is a critical vulnerability that allows for potential code execution due to a heap buffer overflow.
To fix CVE-2019-8258, upgrade to UltraVNC revision 1199 or later.
CVE-2019-8258 affects UltraVNC versions prior to 1.2.2.3 and multiple Siemens Sinumerik software products.
CVE-2019-8258 is classified as a heap buffer overflow vulnerability in the VNC client code.
Yes, CVE-2019-8258 can be exploited via network connectivity.