Ultravnc

Ultravnc

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 07.09.2012 10:32:22
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Untrusted search path vulnerability in UltraVNC 1.0.8.2 allows local users to gain privileges via a Trojan horse vnclang.dll file in the current working directory, as demonstrated by a directory that contains a .vnc file. NOTE: some of these details...

Exploit
  • EPSS 48.67%
  • Veröffentlicht 04.02.2009 19:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple integer signedness errors in (1) UltraVNC 1.0.2 and 1.0.5 and (2) TightVnc 1.3.9 allow remote VNC servers to cause a denial of service (heap corruption and application crash) or possibly execute arbitrary code via a large length value in a m...

  • EPSS 5.54%
  • Veröffentlicht 10.11.2008 14:12:56
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple stack-based buffer overflows in multiple functions in vncviewer/FileTransfer.cpp in vncviewer for UltraVNC 1.0.2 and 1.0.4 before 01252008, when in LISTENING mode or when using the DSM plugin, allow remote attackers to cause a denial of serv...

Exploit
  • EPSS 74.83%
  • Veröffentlicht 06.02.2008 12:00:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Stack-based buffer overflow in the ClientConnection::NegotiateProtocolVersion function in vncviewer/ClientConnection.cpp in vncviewer for UltraVNC 1.0.2 and 1.0.4 before 01252008, when in LISTENING mode or when using the DSM plugin, allows remote att...

Exploit
  • EPSS 0.78%
  • Veröffentlicht 05.05.2006 12:46:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The MS-Logon authentication scheme in UltraVNC (aka Ultr@VNC) 1.0.1 uses weak encryption (XOR) for challenge/response, which allows remote attackers to gain privileges by sniffing and decrypting passwords.