First published: Fri Mar 01 2019(Updated: )
UltraVNC revision 1206 has stack-based Buffer overflow vulnerability in VNC client code inside FileTransfer module, which leads to a denial of service (DoS) condition. This attack appear to be exploitable via network connectivity. This vulnerability has been fixed in revision 1207.
Credit: vulnerability@kaspersky.com vulnerability@kaspersky.com
Affected Software | Affected Version | How to fix |
---|---|---|
UltraVNC | <1.2.2.3 | |
Siemens Sinumerik Access MyMachine/P2P | <4.8 | |
Siemens Sinumerik PCU Base Win10 Software | <14.00 | |
Siemens Sinumerik PCU Base Win7 Software/IPC | <=12.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8269 is classified as a moderate severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2019-8269, update to UltraVNC revision 1207 or later.
CVE-2019-8269 is a stack-based buffer overflow vulnerability found in the VNC client code.
Yes, CVE-2019-8269 can be exploited via network connectivity.
CVE-2019-8269 affects UltraVNC versions up to 1.2.2.3, as well as specific versions of Siemens Sinumerik products.