UltraVNC revision 1211 has multiple off-by-one vulnerabilities in VNC server code, which can potentially result in code execution. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1212.
A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.
Link | Tags |
---|---|
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-019-ultravnc-off-by-one-error/ | third party advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf | third party advisory |
https://www.us-cert.gov/ics/advisories/icsa-20-161-06 | third party advisory us government resource |