CVE-2019-8277

UltraVNC revision 1211 contains multiple memory leaks (CWE-665) in VNC server code, which allows an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1212.
Configurations

Configuration 1 (hide)

cpe:2.3:a:uvnc:ultravnc:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:siemens:sinumerik_access_mymachine\/p2p:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:sinumerik_pcu_base_win10_software\/ipc:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:sinumerik_pcu_base_win7_software\/ipc:*:*:*:*:*:*:*:*

History

11 May 2021, 13:15

Type Values Removed Values Added
References
  • (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf -
  • (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf -

Information

Published : 2019-03-08 23:29

Updated : 2023-12-10 12:59


NVD link : CVE-2019-8277

Mitre link : CVE-2019-8277

CVE.ORG link : CVE-2019-8277


JSON object : View

Products Affected

uvnc

  • ultravnc

siemens

  • sinumerik_pcu_base_win10_software\/ipc
  • sinumerik_access_mymachine\/p2p
  • sinumerik_pcu_base_win7_software\/ipc
CWE
CWE-665

Improper Initialization