Multiple buffer overflows in (a) UltraVNC (aka Ultr@VNC) 1.0.1 and earlier and (b) tabbed_viewer 1.29 (1) allow user-assisted remote attackers to execute arbitrary code via a malicious server that sends a long string to a client that connects on TCP port 5900, which triggers an overflow in Log::ReallyPrint; and (2) allow remote attackers to cause a denial of service (server crash) via a long HTTP GET request to TCP port 5800, which triggers an overflow in VNCLog::ReallyPrint.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| https://www.exploit-db.com/exploits/1642 | exploit x_refsource_EXPLOIT-DB |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/25648 | vdb-entry x_refsource_XF |
| https://www.exploit-db.com/exploits/1643 | exploit x_refsource_EXPLOIT-DB |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/25650 | vdb-entry x_refsource_XF |
| http://secunia.com/advisories/19513 | third-party-advisory x_refsource_SECUNIA |
| http://www.securityfocus.com/archive/1/430711/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
| http://www.securityfocus.com/archive/1/430287/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
| http://www.vupen.com/english/advisories/2006/1240 | vdb-entry x_refsource_VUPEN |
| http://securityreason.com/securityalert/674 | third-party-advisory x_refsource_SREASON |
| http://www.securityfocus.com/archive/1/429930/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
| http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/044901.html | mailing-list x_refsource_FULLDISC |
| http://www.securityfocus.com/bid/17378 | vdb-entry x_refsource_BID |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|