vendor:
WinVNC
by:
patrick
6.4
CVSS
MEDIUM
Buffer Overflow
120
CWE
Product Name: WinVNC
Affected Version From: v3.3.3r7
Affected Version To: v3.3.3r7
Patch Exists: YES
Related CWE: CVE-2001-0168
CPE: a:att:winvnc:3.3.3r7
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=10930, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/vnc/winvnc_http_get, https://www.infosecmatter.com/nessus-plugin-library/?id=63402, https://www.infosecmatter.com/nessus-plugin-library/?id=56686, https://www.infosecmatter.com/nessus-plugin-library/?id=57938, https://www.infosecmatter.com/nessus-plugin-library/?id=57673, https://www.infosecmatter.com/nessus-plugin-library/?id=156977, https://www.infosecmatter.com/nessus-plugin-library/?id=57656, https://www.infosecmatter.com/nessus-plugin-library/?id=74767, https://www.infosecmatter.com/list-of-metasploit-windows-exploits-detailed-spreadsheet/
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows NT4 SP3-6, Windows 2000 SP1-4, Windows XP SP0-1
2001
WinVNC Web Server <= v3.3.3r7 GET Overflow
This module exploits a buffer overflow in the AT&T WinVNC version <= v3.3.3r7 web server. When debugging mode with logging is enabled (non-default), an overly long GET request can overwrite the stack. This exploit does not work well with VNC payloads!
Mitigation:
Disable debugging mode with logging