Overview
UltraVNC viewer contains a buffer overflow vulnerability. If exploited, this vulnerability may allow an attacker to execute arbitrary code.
Description
| UltraVNC viewer is a remote desktop application that allows a user to control compatible VNC servers. The UltraVNC viewer includes a listen mode that accepts connections from remote hosts. The UltraVNC viewer contains a buffer overflow vulnerability. This vulnerability may be triggered by sending a malformed packet during the protocol negotiation phase of a VNC session. | 
Impact
| A remote, unauthenticated attacker may be able to execute arbitrary code. | 
Solution
| Upgrade | 
| 
 | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
- http://forum.ultravnc.info/viewtopic.php?t=11850
- http://forum.ultravnc.info/viewtopic.php?p=43529
- http://secunia.com/advisories/28747/
- http://www.microsoft.com/technet/security/smallbusiness/prodtech/windowsxp/cfgfwall.mspx
- http://technet2.microsoft.com/WindowsVista/en/library/19b429b3-c32b-4cbd-ae2a-8e77f2ced35c1033.mspx?mfr=true
- http://forum.ultravnc.info/viewtopic.php?t=6005&highlight=5400
Acknowledgements
Thanks to the UltraVNC team and Secunia for information that was used in this report.
This document was written by Ryan Giobbi.
Other Information
| CVE IDs: | CVE-2008-0610 | 
| Severity Metric: | 12.86 | 
| Date Public: | 2008-02-01 | 
| Date First Published: | 2008-03-15 | 
| Date Last Updated: | 2008-03-17 01:22 UTC | 
| Document Revision: | 31 |