First published: Fri Mar 01 2019(Updated: )
UltraVNC revision 1211 has a heap buffer overflow vulnerability in VNC server code inside file transfer handler, which can potentially result code execution. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1212.
Credit: vulnerability@kaspersky.com vulnerability@kaspersky.com
Affected Software | Affected Version | How to fix |
---|---|---|
UltraVNC | <1.2.2.3 | |
Siemens Sinumerik Access MyMachine/P2P | <4.8 | |
Siemens Sinumerik PCU Base Win10 Software | <14.00 | |
Siemens Sinumerik PCU Base Win7 Software/IPC | <=12.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8271 has a high severity rating due to its potential for remote code execution through a heap buffer overflow.
To fix CVE-2019-8271, update UltraVNC to revision 1212 or later.
CVE-2019-8271 affects versions of UltraVNC prior to revision 1212.
Yes, CVE-2019-8271 can be exploited remotely via network connectivity.
The impact of CVE-2019-8271 can lead to unauthorized code execution on affected systems.