First published: Fri Mar 01 2019(Updated: )
UltraVNC revision 1211 has multiple off-by-one vulnerabilities in VNC server code, which can potentially result in code execution. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1212.
Credit: vulnerability@kaspersky.com vulnerability@kaspersky.com
Affected Software | Affected Version | How to fix |
---|---|---|
UltraVNC | <1.2.2.3 | |
Siemens Sinumerik Access MyMachine/P2P | <4.8 | |
Siemens Sinumerik PCU Base Win10 Software | <14.00 | |
Siemens Sinumerik PCU Base Win7 Software/IPC | <=12.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8272 has a high severity rating due to its potential to enable code execution through off-by-one vulnerabilities.
To fix CVE-2019-8272, update to UltraVNC revision 1212 or later.
CVE-2019-8272 affects UltraVNC versions before revision 1212.
Yes, the vulnerabilities in CVE-2019-8272 can be exploited via network connectivity.
Yes, Siemens' Sinumerik Access MyMachine/P2P and PCU Base software for both Windows 10 and Windows 7 are also affected by CVE-2019-8272.