From 7d7ad41aa58c6566e608a83046b706cd41b25dc6 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 5 Mar 2019 09:38:16 -0500 Subject: [PATCH] Adding 7 CVEs for Kaspersky (UltraVNC). --- 2018/15xxx/CVE-2018-15361.json | 49 +++++++++++++++++++++++++++++++--- 2019/8xxx/CVE-2019-8258.json | 49 +++++++++++++++++++++++++++++++--- 2019/8xxx/CVE-2019-8259.json | 49 +++++++++++++++++++++++++++++++--- 2019/8xxx/CVE-2019-8260.json | 49 +++++++++++++++++++++++++++++++--- 2019/8xxx/CVE-2019-8261.json | 49 +++++++++++++++++++++++++++++++--- 2019/8xxx/CVE-2019-8262.json | 49 +++++++++++++++++++++++++++++++--- 2019/8xxx/CVE-2019-8263.json | 49 +++++++++++++++++++++++++++++++--- 7 files changed, 322 insertions(+), 21 deletions(-) diff --git a/2018/15xxx/CVE-2018-15361.json b/2018/15xxx/CVE-2018-15361.json index 683f8f57844..4bf3f025d73 100644 --- a/2018/15xxx/CVE-2018-15361.json +++ b/2018/15xxx/CVE-2018-15361.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "vulnerability@kaspersky.com", + "DATE_PUBLIC" : "2019-03-01T00:00:00", "ID" : "CVE-2018-15361", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "UltraVNC", + "version" : { + "version_data" : [ + { + "version_value" : "1.2.2.3" + } + ] + } + } + ] + }, + "vendor_name" : "UltraVNC" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "UltraVNC revision 1198 has a buffer underflow vulnerability in VNC client code, which can potentially result in code execution. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1199." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-124: Buffer Underwrite" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-003-ultravnc-buffer-underwrite/" } ] } diff --git a/2019/8xxx/CVE-2019-8258.json b/2019/8xxx/CVE-2019-8258.json index 6b23e22fae8..07ed1f64e5e 100644 --- a/2019/8xxx/CVE-2019-8258.json +++ b/2019/8xxx/CVE-2019-8258.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "vulnerability@kaspersky.com", + "DATE_PUBLIC" : "2019-03-01T00:00:00", "ID" : "CVE-2019-8258", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "UltraVNC", + "version" : { + "version_data" : [ + { + "version_value" : "1.2.2.3" + } + ] + } + } + ] + }, + "vendor_name" : "UltraVNC" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "UltraVNC revision 1198 has a heap buffer overflow vulnerability in VNC client code which results code execution. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1199." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-122: Heap-based Buffer Overflow" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-004-ultravnc-heap-based-buffer-overflow/" } ] } diff --git a/2019/8xxx/CVE-2019-8259.json b/2019/8xxx/CVE-2019-8259.json index 51a78862b96..28bf4760841 100644 --- a/2019/8xxx/CVE-2019-8259.json +++ b/2019/8xxx/CVE-2019-8259.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "vulnerability@kaspersky.com", + "DATE_PUBLIC" : "2019-03-01T00:00:00", "ID" : "CVE-2019-8259", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "UltraVNC", + "version" : { + "version_data" : [ + { + "version_value" : "1.2.2.3" + } + ] + } + } + ] + }, + "vendor_name" : "UltraVNC" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "UltraVNC revision 1198 contains multiple memory leaks (CWE-655) in VNC client code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1199." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-665: Improper Initialization" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-005-ultravnc-memory-leak/" } ] } diff --git a/2019/8xxx/CVE-2019-8260.json b/2019/8xxx/CVE-2019-8260.json index 9330d4d6d64..c20a3b6c60a 100644 --- a/2019/8xxx/CVE-2019-8260.json +++ b/2019/8xxx/CVE-2019-8260.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "vulnerability@kaspersky.com", + "DATE_PUBLIC" : "2019-03-01T00:00:00", "ID" : "CVE-2019-8260", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "UltraVNC", + "version" : { + "version_data" : [ + { + "version_value" : "1.2.2.3" + } + ] + } + } + ] + }, + "vendor_name" : "UltraVNC" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "UltraVNC revision 1199 has a out-of-bounds read vulnerability in VNC client RRE decoder code, caused by multiplication overflow. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1200." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-125: Out-of-bounds Read" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-006-ultravnc-out-of-bound-read/" } ] } diff --git a/2019/8xxx/CVE-2019-8261.json b/2019/8xxx/CVE-2019-8261.json index 17db61db23b..afc9cc23af4 100644 --- a/2019/8xxx/CVE-2019-8261.json +++ b/2019/8xxx/CVE-2019-8261.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "vulnerability@kaspersky.com", + "DATE_PUBLIC" : "2019-03-01T00:00:00", "ID" : "CVE-2019-8261", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "UltraVNC", + "version" : { + "version_data" : [ + { + "version_value" : "1.2.2.3" + } + ] + } + } + ] + }, + "vendor_name" : "UltraVNC" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "UltraVNC revision 1199 has a out-of-bounds read vulnerability in VNC code inside client CoRRE decoder, caused by multiplication overflow. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1200." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-125: Out-of-bounds Read" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-007-ultravnc-out-of-bound-read/" } ] } diff --git a/2019/8xxx/CVE-2019-8262.json b/2019/8xxx/CVE-2019-8262.json index 9803d434016..a0bde6d40bb 100644 --- a/2019/8xxx/CVE-2019-8262.json +++ b/2019/8xxx/CVE-2019-8262.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "vulnerability@kaspersky.com", + "DATE_PUBLIC" : "2019-03-01T00:00:00", "ID" : "CVE-2019-8262", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "UltraVNC", + "version" : { + "version_data" : [ + { + "version_value" : "1.2.2.3" + } + ] + } + } + ] + }, + "vendor_name" : "UltraVNC" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "UltraVNC revision 1203 has multiple heap buffer overflow vulnerabilities in VNC client code inside Ultra decoder, which results in code execution. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1204." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-122: Heap-based Buffer Overflow" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://ics-cert.kaaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-008-ultravnc-heap-based-buffer-overflow/" } ] } diff --git a/2019/8xxx/CVE-2019-8263.json b/2019/8xxx/CVE-2019-8263.json index ab8f0551a1d..5b78ba7d4ba 100644 --- a/2019/8xxx/CVE-2019-8263.json +++ b/2019/8xxx/CVE-2019-8263.json @@ -1,8 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "vulnerability@kaspersky.com", + "DATE_PUBLIC" : "2019-03-01T00:00:00", "ID" : "CVE-2019-8263", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "UltraVNC", + "version" : { + "version_data" : [ + { + "version_value" : "1.2.2.3" + } + ] + } + } + ] + }, + "vendor_name" : "UltraVNC" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +35,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "UltraVNC revision 1203 has out-of-bounds access vulnerability in VNC client inside RAW decoder, which can potentially result code in execution. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1204." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-788: Access of Memory Location After End of Buffer" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-009-ultravnc-access-of-memory-location-after-end-of-buffer/" } ] }