First published: Fri Mar 01 2019(Updated: )
UltraVNC revision 1211 has a heap buffer overflow vulnerability in VNC server code inside file transfer request handler, which can potentially result in code execution. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1212.
Credit: vulnerability@kaspersky.com vulnerability@kaspersky.com
Affected Software | Affected Version | How to fix |
---|---|---|
UltraVNC | <1.2.2.3 | |
Siemens Sinumerik Access MyMachine/P2P | <4.8 | |
Siemens Sinumerik PCU Base Win10 Software | <14.00 | |
Siemens Sinumerik PCU Base Win7 Software/IPC | <=12.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8273 has a critical severity level due to its potential for code execution via a heap buffer overflow.
To fix CVE-2019-8273, upgrade UltraVNC to revision 1212 or later.
CVE-2019-8273 affects UltraVNC versions prior to 1.2.2.3 and specific Siemens Sinumerik software versions.
Yes, CVE-2019-8273 can be exploited remotely through network connectivity.
CVE-2019-8273 represents a heap buffer overflow vulnerability which can lead to arbitrary code execution.