A vulnerability exists within UltraVNC’s “vncviewer.exe” client. A malicious server can trigger an arbitrary memory write condition through a flaw in the function ClientConnection::SolidColor while drawing pixel data to the screen. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the UltraVNC Viewer process.
- Exodus Intelligence: EIP-0e1ca3ec
- MITRE CVE: PENDING
- CVSSv2 Score: 5.8
- Exodus Intelligence
- Disclosed to affected vendor: December 8th, 2021
- Disclosed to public: December 16th, 2021
Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at firstname.lastname@example.org.
Researchers who are interested in monetizing their 0Day and NDay can work with us through our Research Sponsorship Program.