UltraVNC revision 1206 has multiple off-by-one vulnerabilities in VNC client code connected with improper usage of ClientConnection::ReadString function, which can potentially result code execution. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1207.
A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.
Link | Tags |
---|---|
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-015-ultravnc-off-by-one-error/ | third party advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf | third party advisory |
https://www.us-cert.gov/ics/advisories/icsa-20-161-06 | third party advisory us government resource |