CVE-2009-0388
Published: 4 February 2009
Multiple integer signedness errors in (1) UltraVNC 1.0.2 and 1.0.5 and (2) TightVnc 1.3.9 allow remote VNC servers to cause a denial of service (heap corruption and application crash) or possibly execute arbitrary code via a large length value in a message, related to the (a) ClientConnection::CheckBufferSize and (b) ClientConnection::CheckFileZipBufferSize functions in ClientConnection.cpp.
Notes
Author | Note |
---|---|
mdeslaur | windows only |
Priority
Status
Package | Release | Status |
---|---|---|
tightvnc Launchpad, Ubuntu, Debian |
dapper |
Ignored
(end of life)
|
gutsy |
Ignored
(end of life)
|
|
hardy |
Not vulnerable
(Windows only)
|
|
intrepid |
Not vulnerable
(Windows only)
|
|
jaunty |
Not vulnerable
(Windows only)
|
|
karmic |
Not vulnerable
(Windows only)
|
|
upstream |
Needs triage
|
|
Patches: upstream: http://vnc-tight.svn.sourceforge.net/viewvc/vnc-tight?view=rev&revision=3564 |