Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2009-0388Tightvnc vulnerability

CWE-1898 documents6 sources
Severity
10.0CRITICALNVD
EPSS
48.3%
top 2.25%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedFeb 4
Latest updateMay 2

Description

Multiple integer signedness errors in (1) UltraVNC 1.0.2 and 1.0.5 and (2) TightVnc 1.3.9 allow remote VNC servers to cause a denial of service (heap corruption and application crash) or possibly execute arbitrary code via a large length value in a message, related to the (a) ClientConnection::CheckBufferSize and (b) ClientConnection::CheckFileZipBufferSize functions in ClientConnection.cpp.

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages3 packages

NVDultravnc/ultravnc1.0.2, 1.0.5+1

Patches

🔴Vulnerability Details

1
GHSA
GHSA-j23w-r722-rm78: Multiple integer signedness errors in (1) UltraVNC 12022-05-02

💥Exploits & PoCs

2
Exploit-DB
TightVNC - Authentication Failure Integer Overflow (PoC)2009-02-09
Exploit-DB
UltraVNC/TightVNC (Multiple VNC Clients) - Multiple Integer Overflows (PoC)2009-02-04

📋Vendor Advisories

1
Debian
CVE-2009-0388: tightvnc - Multiple integer signedness errors in (1) UltraVNC 1.0.2 and 1.0.5 and (2) Tight...2009

🕵️Threat Intelligence

2
Wiz
CVE-2026-3787 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2026-4962 Impact, Exploitability, and Mitigation Steps | Wiz

💬Community

1
Bugzilla
CVE-2009-3701 horde: PHP_SELF XSS vulnerabilities2009-12-21