10
CVSSv2

CVE-2009-0388

Published: 04/02/2009 Updated: 11/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple integer signedness errors in (1) UltraVNC 1.0.2 and 1.0.5 and (2) TightVnc 1.3.9 allow remote VNC servers to cause a denial of service (heap corruption and application crash) or possibly execute arbitrary code via a large length value in a message, related to the (a) ClientConnection::CheckBufferSize and (b) ClientConnection::CheckFileZipBufferSize functions in ClientConnection.cpp.

Vulnerable Product Search on Vulmon Subscribe to Product

tightvnc tightvnc 1.3.9

ultravnc ultravnc 1.0.2

ultravnc ultravnc 1.0.5

Exploits

TightVNC authentication failure integer overflow proof of concept exploit ...
#!/usr/bin/env python #digitaldesi@incom # Modified Andres Lopez Luksenberg's exploit for Authentication Failure scenario in TightVNC BID 33569 CVE-2009-0388 import socket serversocket = socketsocket(socketAF_INET, socketSOCK_STREAM) serversocketbind(('', 5900)) serversocketlisten(1) while True: clientsocket, clientaddres = serverso ...
#!/usr/bin/env python # POC: Multiple VNC Clients Multiple Integer Overflow Vulnerabilities(UltraVNC and TightVNC), BID 33568 #Author: Andres Lopez Luksenberg <polakocai@gmailcom> (Visit: 2086616113/~andres/) # import socket serversocket = socketsocket(socketAF_INET, socketSOCK_STREAM) serversocketbind(('', 5900)) serversocket ...