cve/2019/CVE-2019-8276.md

18 lines
867 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-8276](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8276)
![](https://img.shields.io/static/v1?label=Product&message=UltraVNC&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-121%3A%20Stack-based%20Buffer%20Overflow&color=brighgreen)
### Description
UltraVNC revision 1211 has a stack buffer overflow vulnerability in VNC server code inside file transfer request handler, which can result in Denial of Service (DoS). This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1212.
### POC
#### Reference
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-023-ultravnc-stack-based-buffer-overflow/
#### Github
No PoCs found on GitHub currently.