First published: Fri Mar 01 2019(Updated: )
UltraVNC revision 1207 has multiple out-of-bounds access vulnerabilities connected with improper usage of ClientConnection::Copybuffer function in VNC client code, which can potentially result in code execution. This attack appears to be exploitable via network connectivity. User interaction is required to trigger these vulnerabilities. These vulnerabilities have been fixed in revision 1208.
Credit: vulnerability@kaspersky.com vulnerability@kaspersky.com
Affected Software | Affected Version | How to fix |
---|---|---|
UltraVNC | <1.2.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8266 is classified as a high severity vulnerability due to its potential for code execution.
To mitigate CVE-2019-8266, users should update UltraVNC to a version that is not affected by this vulnerability.
The risks of CVE-2019-8266 include potential code execution on the affected system via network connectivity.
Users of UltraVNC versions up to 1.2.2.3 are affected by CVE-2019-8266.
Yes, CVE-2019-8266 can potentially be exploited remotely if the vulnerable UltraVNC version is accessible.