First published: Fri Mar 08 2019(Updated: )
UltraVNC revision 1211 contains multiple memory leaks (CWE-665) in VNC server code, which allows an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1212.
Credit: vulnerability@kaspersky.com vulnerability@kaspersky.com
Affected Software | Affected Version | How to fix |
---|---|---|
UltraVNC | <1.2.2.3 | |
Siemens Sinumerik Access MyMachine/P2P | <4.8 | |
Siemens Sinumerik PCU Base Win10 Software | <14.00 | |
Siemens Sinumerik PCU Base Win7 Software/IPC | <=12.01 | |
Siemens SINAMICS GH150 | ||
Siemens SINAMICS GL150 Firmware | ||
Siemens SINAMICS GM150 (with option X30) | ||
Siemens SINAMICS SH150 firmware | ||
Siemens SINAMICS SL150 | ||
Siemens SINAMICS SM120 | ||
Siemens SINAMICS SM150 Firmware | ||
Siemens SINAMICS SM150i firmware | ||
Siemens SIMATIC HMI Comfort Outdoor Panels 7’ and 15’ (incl. SIPLUS variants) Update 4 | <16 | 16 |
Siemens SIMATIC HMI Comfort Panels | <16 | 16 |
Siemens SIMATIC HMI Mobile Panels | <16 | 16 |
Siemens SIMATIC WinCC Runtime Advanced | <16 | 16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8277 is classified as having a medium severity due to its information disclosure potential resulting from memory leaks.
To mitigate CVE-2019-8277, update affected products to the latest firmware or version that addresses this vulnerability.
CVE-2019-8277 affects multiple versions of UltraVNC and various Siemens products, including SINAMICS and SIMATIC series.
Yes, CVE-2019-8277 may be exploited remotely due to memory leak issues in the VNC server code.
The potential impacts of CVE-2019-8277 include unauthorized access to sensitive information and the ability to bypass Address Space Layout Randomization (ASLR).