Vulnerability Description
Stack-based buffer overflow in the ClientConnection::NegotiateProtocolVersion function in vncviewer/ClientConnection.cpp in vncviewer for UltraVNC 1.0.2 and 1.0.4 before 01252008, when in LISTENING mode or when using the DSM plugin, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a modified size value.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ultravnc | Ultravnc | 1.0.2 |
Related Weaknesses (CWE)
References
- http://forum.ultravnc.info/viewtopic.php?t=11850
- http://secunia.com/advisories/28747PatchVendor Advisory
- http://sourceforge.net/project/shownotes.php?release_id=571174&group_id=63887
- http://ultravnc.svn.sourceforge.net/viewvc/ultravnc/UltraVNC%20Project%20Root/Ul
- http://www.exploit-db.com/exploits/18666
- http://www.kb.cert.org/vuls/id/721460US Government Resource
- http://www.securityfocus.com/bid/27561ExploitPatch
- http://www.securitytracker.com/id?1019293
- http://www.vupen.com/english/advisories/2008/0392
- http://forum.ultravnc.info/viewtopic.php?t=11850
- http://secunia.com/advisories/28747PatchVendor Advisory
- http://sourceforge.net/project/shownotes.php?release_id=571174&group_id=63887
- http://ultravnc.svn.sourceforge.net/viewvc/ultravnc/UltraVNC%20Project%20Root/Ul
- http://www.exploit-db.com/exploits/18666
- http://www.kb.cert.org/vuls/id/721460US Government Resource
FAQ
What is CVE-2008-0610?
CVE-2008-0610 is a vulnerability with a CVSS score of 9.3 (HIGH). Stack-based buffer overflow in the ClientConnection::NegotiateProtocolVersion function in vncviewer/ClientConnection.cpp in vncviewer for UltraVNC 1.0.2 and 1.0.4 before 01252008, when in LISTENING mo...
How severe is CVE-2008-0610?
CVE-2008-0610 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-0610?
Check the references section above for vendor advisories and patch information. Affected products include: Ultravnc Ultravnc.