First published: Tue Mar 05 2019(Updated: )
UltraVNC revision 1199 has a out-of-bounds read vulnerability in VNC code inside client CoRRE decoder, caused by multiplication overflow. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1200.
Credit: vulnerability@kaspersky.com vulnerability@kaspersky.com
Affected Software | Affected Version | How to fix |
---|---|---|
UltraVNC | <1.2.2.3 | |
Siemens SINAMICS GH150 | ||
Siemens SINAMICS GL150 Firmware | ||
Siemens SINAMICS GM150 (with option X30) | ||
Siemens SINAMICS SH150 firmware | ||
Siemens SINAMICS SL150 | ||
Siemens SINAMICS SM120 | ||
Siemens SINAMICS SM150 Firmware | ||
Siemens SINAMICS SM150i firmware | ||
Siemens SIMATIC HMI Comfort Outdoor Panels 7’ and 15’ (incl. SIPLUS variants) Update 4 | <16 | 16 |
Siemens SIMATIC HMI Comfort Panels | <16 | 16 |
Siemens SIMATIC HMI Mobile Panels | <16 | 16 |
Siemens SIMATIC WinCC Runtime Advanced | <16 | 16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8261 is categorized as a high severity vulnerability due to its potential impact on software integrity.
To fix CVE-2019-8261, upgrade your UltraVNC software to revision 1200 or later.
UltraVNC versions prior to revision 1200 are affected by CVE-2019-8261.
Yes, CVE-2019-8261 can be exploited via network connectivity.
CVE-2019-8261 is an out-of-bounds read vulnerability caused by multiplication overflow.