First published: Tue Mar 05 2019(Updated: )
UltraVNC revision 1203 has multiple heap buffer overflow vulnerabilities in VNC client code inside Ultra decoder, which results in code execution. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1204.
Credit: vulnerability@kaspersky.com vulnerability@kaspersky.com
Affected Software | Affected Version | How to fix |
---|---|---|
UltraVNC | <1.2.2.3 | |
Siemens Sinumerik Access MyMachine/P2P | <4.8 | |
Siemens Sinumerik PCU Base Win10 Software | <14.00 | |
Siemens Sinumerik PCU Base Win7 Software/IPC | <=12.01 | |
Siemens SINAMICS GH150 | ||
Siemens SINAMICS GL150 Firmware | ||
Siemens SINAMICS GM150 (with option X30) | ||
Siemens SINAMICS SH150 firmware | ||
Siemens SINAMICS SL150 | ||
Siemens SINAMICS SM120 | ||
Siemens SINAMICS SM150 Firmware | ||
Siemens SINAMICS SM150i firmware | ||
Siemens SIMATIC HMI Comfort Outdoor Panels 7’ and 15’ (incl. SIPLUS variants) Update 4 | <16 | 16 |
Siemens SIMATIC HMI Comfort Panels | <16 | 16 |
Siemens SIMATIC HMI Mobile Panels | <16 | 16 |
Siemens SIMATIC WinCC Runtime Advanced | <16 | 16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8262 has a high severity rating due to its potential to allow code execution through heap buffer overflow vulnerabilities.
To fix CVE-2019-8262, update to UltraVNC revision 1204 or apply patches provided by Siemens for affected products.
CVE-2019-8262 affects UltraVNC revision 1203 and specific versions of Siemens SIMATIC and SINAMICS products.
Yes, CVE-2019-8262 is exploitable via network connectivity, making it a significant risk.
CVE-2019-8262 involves multiple heap buffer overflow vulnerabilities in the VNC client code.