UltraVNC Multiple Remote Error Logging Buffer Overflow Vulnerabilities

BID:17378

Info

UltraVNC Multiple Remote Error Logging Buffer Overflow Vulnerabilities

Bugtraq ID: 17378
Class: Boundary Condition Error
CVE:
Remote: Yes
Local: No
Published: Apr 04 2006 12:00AM
Updated: Jun 21 2006 09:55PM
Credit: Luigi Auriemma <[email protected]> discovered these issues.
Vulnerable: Ultr@VNC Ultr@VNC 1.0.1
Not Vulnerable: Ultr@VNC Ultr@VNC 1.0.2

Discussion

UltraVNC Multiple Remote Error Logging Buffer Overflow Vulnerabilities

UltraVNC is susceptible to multiple error-logging remote buffer-overflow vulnerabilities. These issues are due to the application's failure to properly bounds-check user-supplied input before copying it to insufficiently sized memory buffers.

A successful attack may allow remote attackers to execute arbitrary code on a vulnerable computer to gain unauthorized access in the context of the application.

Exploit / POC

UltraVNC Multiple Remote Error Logging Buffer Overflow Vulnerabilities

Proof-of-concept exploit code designed to crash both clients and servers is available.

Exploit code designed to execute 'calc' on Microsoft Windows in clients is available.

Solution / Fix

UltraVNC Multiple Remote Error Logging Buffer Overflow Vulnerabilities

Solution:
The vendor has released version 1.0.2 to address this issue. Users are advised to contact the vendor for details on obtaining the appropriate updates.

References

UltraVNC Multiple Remote Error Logging Buffer Overflow Vulnerabilities

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report