{ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0388", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple integer signedness errors in (1) UltraVNC 1.0.2 and 1.0.5 and (2) TightVnc 1.3.9 allow remote VNC servers to cause a denial of service (heap corruption and application crash) or possibly execute arbitrary code via a large length value in a message, related to the (a) ClientConnection::CheckBufferSize and (b) ClientConnection::CheckFileZipBufferSize functions in ClientConnection.cpp." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://forum.ultravnc.info/viewtopic.php?t=14654", "refsource": "CONFIRM", "url": "http://forum.ultravnc.info/viewtopic.php?t=14654" }, { "name": "http://vnc-tight.svn.sourceforge.net/viewvc/vnc-tight?view=rev&revision=3564", "refsource": "CONFIRM", "url": "http://vnc-tight.svn.sourceforge.net/viewvc/vnc-tight?view=rev&revision=3564" }, { "name": "ADV-2009-0321", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0321" }, { "name": "33568", "refsource": "BID", "url": "http://www.securityfocus.com/bid/33568" }, { "name": "20090203 CORE-2008-1009 - VNC Multiple Integer Overflows", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/500632/100/0/threaded" }, { "name": "8024", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/8024" }, { "name": "http://www.coresecurity.com/content/vnc-integer-overflows", "refsource": "MISC", "url": "http://www.coresecurity.com/content/vnc-integer-overflows" }, { "name": "ADV-2009-0322", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0322" }, { "name": "7990", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/7990" }, { "name": "33807", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33807" } ] } }