cve/2019/CVE-2019-8264.md

18 lines
893 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-8264](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8264)
![](https://img.shields.io/static/v1?label=Product&message=UltraVNC&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-788%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer&color=brighgreen)
### Description
UltraVNC revision 1203 has out-of-bounds access vulnerability in VNC client inside Ultra2 decoder, which can potentially result in code execution. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1204.
### POC
#### Reference
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-011-ultravnc-access-of-memory-location-after-end-of-buffer/
#### Github
No PoCs found on GitHub currently.