Upstream information
Description
Buffer overflow in AT&T WinVNC (Virtual Network Computing) server 3.3.3r7 and earlier allows remote attackers to execute arbitrary commands via a long HTTP GET request when the DebugLevel registry key is greater than 0.SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having critical severity.
National Vulnerability Database | |
---|---|
Base Score | 10 |
Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Access Vector | Network |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | Complete |
Integrity Impact | Complete |
Availability Impact | Complete |
Note from the SUSE Security Team
This vulnerability is specific to WinVNC, a windows VNC server. No Linux implementation of VNC is affected by this.If you came to this page due to a Qualys scanner output, please make sure to tell Qualys to fix their scanner, that already detected Linux presence in its scan before to avoid Windows software misdetection.
No SUSE Bugzilla entries cross referenced. No SUSE Security Announcements cross referenced.SUSE Timeline for this CVE
CVE page created: Thu Jun 27 23:52:59 2013CVE page last modified: Fri Oct 7 12:45:22 2022