Overview
UltraVNC repeater versions prior to ultravnc_repeater_1300 do not restrict usage by IP address by default and cannot restrict by ports, which may be leveraged to induce connections to arbitrary hosts using any port.
Description
| CWE-16: Configuration - CVE-2016-5673 UltraVNC repeater acts as a proxy to route remote desktop VNC connections. IP addresses are not restricted in default configurations, and ports cannot be selectively restricted. Consequently, in a default installation, a repeater can be caused to initiate connections to arbitrary hosts using any port. To initiate a connection to a common web service, for instance, an attacker may request a connection to <IP>::<80><padding>, where padding consists of null bytes and the request length is 250 bytes. | 
Impact
| A remote, unauthenticated attacker may induce a default-configured repeater to initiate connections to arbitrary hosts and services. | 
Solution
| Update repeater configuration | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | 5 | AV:N/AC:L/Au:N/C:N/I:P/A:N | 
| Temporal | 3.9 | E:POC/RL:OF/RC:C | 
| Environmental | 1.0 | CDP:ND/TD:L/CR:ND/IR:ND/AR:ND | 
References
Acknowledgements
Thanks to Yonathan Klijnsma and Dan Tentler for reporting this vulnerability.
This document was written by Joel Land.
Other Information
| CVE IDs: | CVE-2016-5673 | 
| Date Public: | 2016-08-06 | 
| Date First Published: | 2016-08-08 | 
| Date Last Updated: | 2016-08-08 14:01 UTC | 
| Document Revision: | 22 |