Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2009-0388 — Tightvnc vulnerability
Severity
10.0CRITICALNVD
EPSS
48.3%
top 2.25%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedFeb 4
Latest updateMay 2
Description
Multiple integer signedness errors in (1) UltraVNC 1.0.2 and 1.0.5 and (2) TightVnc 1.3.9 allow remote VNC servers to cause a denial of service (heap corruption and application crash) or possibly execute arbitrary code via a large length value in a message, related to the (a) ClientConnection::CheckBufferSize and (b) ClientConnection::CheckFileZipBufferSize functions in ClientConnection.cpp.
CVSS vector
AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0
Affected Packages3 packages
Patches
🔴Vulnerability Details
1💥Exploits & PoCs
2📋Vendor Advisories
1Debian▶
CVE-2009-0388: tightvnc - Multiple integer signedness errors in (1) UltraVNC 1.0.2 and 1.0.5 and (2) Tight...↗2009