vendor:
RealVNC Windows Client
by:
Unknown
7.5
CVSS
HIGH
Denial of Service
Unknown
CWE
Product Name: RealVNC Windows Client
Affected Version From: 4.1.2.0
Affected Version To: 4.1.2.0
Patch Exists: NO
Related CWE: Unknown
CPE: cpe:vulnerability:realvnc_windows_client_dos
Platforms Tested: Windows
Unknown
RealVNC Windows Client DoS
This exploit targets the RealVNC Windows Client and causes a Denial of Service (DoS). The vulnerability is triggered by sending a crafted packet to the VNC server, causing the client to crash. The specific vulnerability details are as follows: AppName: vncviewer.exe, AppVer: 4.1.2.0, ModName: vncviewer.exe, ModVer: 4.1.2.0, Offset: 000229e0. The exploit code listens on port 5900, accepts a client connection, negotiates the protocol, accepts the security type, and sends a crafted packet to trigger the DoS.
Mitigation:
Update the RealVNC Windows Client to a patched version or consider using an alternative VNC client.