A vulnerability exists within UltraVNC’s “vncviewer.exe” client. Specifically a heap overflow can be triggered in the “ClientConnection::ReadUltraRect” function upon decompression of malicious formatted data returned from a nefarious server. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the UltraVNC Viewer process.
- Exodus Intelligence: EIP-930b0ea5
- MITRE CVE: PENDING
- CVSSv2 Score: 5.8
- Exodus Intelligence
- Disclosed to affected vendor: December 8th, 2021
- Disclosed to public: December 16th, 2021
Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at firstname.lastname@example.org.
Researchers who are interested in monetizing their 0Day and NDay can work with us through our Research Sponsorship Program.