UltraVNC Viewer VNC client Remote Memory Leak Vulnerability
2021-12-03 08:06:50 Author: blog.exodusintel.com(查看原文) 阅读量:20 收藏

EIP-5182fb5b

A vulnerability exists within UltraVNC view due to a lack of proper stack memory buffer cleanup before constructing the ‘rfbTextChat’ message, which results in a leak of 3-bytes of stack memory. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the UltraVNC Viewer process.

Vulnerability Identifiers

  • Exodus Intelligence: EIP-5182fb5b
  • MITRE CVE: 

Vulnerability Metrics

  • CVSSv2 Score: 4.3

Vendor References

  • https://github.com/ultravnc/UltraVNC/releases/tag/1.3.4

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to affected vendor: June 21th, 2021
  • Disclosed to public: September 25th, 2021

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at [email protected].

Researchers who are interested in monetizing their 0Day and NDay can work with us through our Research Sponsorship Program.


文章来源: https://blog.exodusintel.com/2021/12/02/ultravnc-viewer-vnc-client-remote-memory-leak-vulnerability/?utm_source=rss&utm_medium=rss&utm_campaign=ultravnc-viewer-vnc-client-remote-memory-leak-vulnerability
如有侵权请联系:admin#unsafe.sh