First published: Fri Mar 01 2019(Updated: )
UltraVNC revision 1206 has multiple off-by-one vulnerabilities in VNC client code connected with improper usage of ClientConnection::ReadString function, which can potentially result code execution. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1207.
Credit: vulnerability@kaspersky.com vulnerability@kaspersky.com
Affected Software | Affected Version | How to fix |
---|---|---|
UltraVNC | <1.2.2.3 | |
Siemens Sinumerik Access MyMachine/P2P | <4.8 | |
Siemens Sinumerik PCU Base Win10 Software | <14.00 | |
Siemens Sinumerik PCU Base Win7 Software/IPC | <=12.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8268 is considered a high-severity vulnerability due to its potential for remote code execution.
To fix CVE-2019-8268, update UltraVNC to version 1.2.2.3 or later, and ensure all affected Siemens software is patched to the latest version.
CVE-2019-8268 is categorized as an off-by-one vulnerability affecting the VNC client code.
Yes, CVE-2019-8268 can be exploited remotely through network connectivity.
CVE-2019-8268 affects specific versions of UltraVNC and several versions of Siemens Sinumerik software.