UltraVNC revision 1198 contains multiple memory leaks (CWE-655) in VNC client code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1199.
The product does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Link | Tags |
---|---|
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-005-ultravnc-memory-leak/ | third party advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf | third party advisory |
https://www.us-cert.gov/ics/advisories/icsa-20-161-06 | third party advisory us government resource |
https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf | |
https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf | |
https://us-cert.cisa.gov/ics/advisories/icsa-21-131-11 |