Memory Leak Vulnerability in UltraVNC by UltraVNC
CVE-2019-8277

7.5HIGH

Key Information:

Vendor
Kaspersky
Status
Vendor
CVE Published:
8 March 2019

Summary

UltraVNC revision 1211 suffers from multiple memory leaks in its VNC server implementation, leading to stack memory exposure. An adversary could exploit these leaks to gain unauthorized access to sensitive information, especially when paired with additional vulnerabilities that could allow bypassing Address Space Layout Randomization (ASLR). This risk is particularly concerning given the potential for remote exploitation through network connectivity. The issue has been rectified in revision 1212, highlighting the importance of maintaining updated software to mitigate security risks.

Affected Version(s)

UltraVNC revision 1211

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.