HIGH · 7.5

CVE-2019-8276

UltraVNC revision 1211 has a stack buffer overflow vulnerability in VNC server code inside file transfer request handler, which can result in Denial of Service (DoS). This attack appears to be exploit...

Vulnerability Description

UltraVNC revision 1211 has a stack buffer overflow vulnerability in VNC server code inside file transfer request handler, which can result in Denial of Service (DoS). This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1212.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
UvncUltravnc< 1.2.2.3
SiemensSinumerik Access Mymachine\/P2P< 4.8
SiemensSinumerik Pcu Base Win10 Software\/Ipc< 14.00
SiemensSinumerik Pcu Base Win7 Software\/Ipc<= 12.01

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-8276?

CVE-2019-8276 is a vulnerability with a CVSS score of 7.5 (HIGH). UltraVNC revision 1211 has a stack buffer overflow vulnerability in VNC server code inside file transfer request handler, which can result in Denial of Service (DoS). This attack appears to be exploit...

How severe is CVE-2019-8276?

CVE-2019-8276 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-8276?

Check the references section above for vendor advisories and patch information. Affected products include: Uvnc Ultravnc, Siemens Sinumerik Access Mymachine\/P2P, Siemens Sinumerik Pcu Base Win10 Software\/Ipc, Siemens Sinumerik Pcu Base Win7 Software\/Ipc.