CVE-2009-0388
Severity CVSS v4.0:
Pending analysis
Type:
CWE-189
Numeric Errors
Publication date:
04/02/2009
Last modified:
09/04/2025
Description
Multiple integer signedness errors in (1) UltraVNC 1.0.2 and 1.0.5 and (2) TightVnc 1.3.9 allow remote VNC servers to cause a denial of service (heap corruption and application crash) or possibly execute arbitrary code via a large length value in a message, related to the (a) ClientConnection::CheckBufferSize and (b) ClientConnection::CheckFileZipBufferSize functions in ClientConnection.cpp.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:tightvnc:tightvnc:1.3.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ultravnc:ultravnc:1.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ultravnc:ultravnc:1.0.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://forum.ultravnc.info/viewtopic.php?t=14654
- http://secunia.com/advisories/33807
- http://vnc-tight.svn.sourceforge.net/viewvc/vnc-tight?view=rev&revision=3564
- http://www.coresecurity.com/content/vnc-integer-overflows
- http://www.securityfocus.com/archive/1/500632/100/0/threaded
- http://www.securityfocus.com/bid/33568
- http://www.vupen.com/english/advisories/2009/0321
- http://www.vupen.com/english/advisories/2009/0322
- https://www.exploit-db.com/exploits/7990
- https://www.exploit-db.com/exploits/8024
- http://forum.ultravnc.info/viewtopic.php?t=14654
- http://secunia.com/advisories/33807
- http://vnc-tight.svn.sourceforge.net/viewvc/vnc-tight?view=rev&revision=3564
- http://www.coresecurity.com/content/vnc-integer-overflows
- http://www.securityfocus.com/archive/1/500632/100/0/threaded
- http://www.securityfocus.com/bid/33568
- http://www.vupen.com/english/advisories/2009/0321
- http://www.vupen.com/english/advisories/2009/0322
- https://www.exploit-db.com/exploits/7990
- https://www.exploit-db.com/exploits/8024



