First published: Fri Mar 01 2019(Updated: )
UltraVNC revision 1211 has a heap buffer overflow vulnerability in VNC server code inside file transfer offer handler, which can potentially in result code execution. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1212.
Credit: vulnerability@kaspersky.com vulnerability@kaspersky.com
Affected Software | Affected Version | How to fix |
---|---|---|
UltraVNC | <1.2.2.3 | |
Siemens Sinumerik Access MyMachine/P2P | <4.8 | |
Siemens Sinumerik PCU Base Win10 Software | <14.00 | |
Siemens Sinumerik PCU Base Win7 Software/IPC | <=12.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8274 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2019-8274, upgrade UltraVNC to revision 1212 or later.
CVE-2019-8274 is caused by a heap buffer overflow vulnerability in the VNC server code.
Yes, CVE-2019-8274 can be exploited remotely through network connectivity.
CVE-2019-8274 affects UltraVNC versions prior to revision 1212.