CVE-2019-8259
05.03.2019, 15:29
UltraVNC revision 1198 contains multiple memory leaks (CWE-655) in VNC client code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appears to be exploitable via network connectivity. These vulnerabilities have been fixed in revision 1199.Enginsight
Vendor | Product | Version |
---|---|---|
uvnc | ultravnc | 𝑥 < 1.2.2.3 |
siemens | sinumerik_access_mymachine\/p2p | 𝑥 < 4.8 |
siemens | sinumerik_pcu_base_win10_software\/ipc | 𝑥 < 14.00 |
siemens | sinumerik_pcu_base_win7_software\/ipc | 𝑥 ≤ 12.01 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-665 - Improper InitializationThe software does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.
- CWE-401 - Missing Release of Memory after Effective LifetimeThe software does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
References