9
CVSSv2

CVE-2006-1652

Published: 06/04/2006 Updated: 18/10/2018
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
VMScore: 915
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

Multiple buffer overflows in (a) UltraVNC (aka Ultr@VNC) 1.0.1 and previous versions and (b) tabbed_viewer 1.29 (1) allow user-assisted remote malicious users to execute arbitrary code via a malicious server that sends a long string to a client that connects on TCP port 5900, which triggers an overflow in Log::ReallyPrint; and (2) allow remote malicious users to cause a denial of service (server crash) via a long HTTP GET request to TCP port 5800, which triggers an overflow in VNCLog::ReallyPrint.

Vulnerable Product Search on Vulmon Subscribe to Product

ultravnc vnc viewer 1.0.1

ultravnc tabbed viewer 1.29

Exploits

## # $Id: ultravnc_clientrb 9179 2010-04-30 08:40:19Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## class Metasploit3 < Msf ...
source: wwwsecurityfocuscom/bid/17378/info UltraVNC is susceptible to multiple error-logging remote buffer-overflow vulnerabilities These issues are due to the application's failure to properly bounds-check user-supplied input before copying it to insufficiently sized memory buffers A successful attack may allow remote attackers to e ...
source: wwwsecurityfocuscom/bid/17378/info UltraVNC is susceptible to multiple error-logging remote buffer-overflow vulnerabilities These issues are due to the application's failure to properly bounds-check user-supplied input before copying it to insufficiently sized memory buffers A successful attack may allow remote attackers to exe ...