{"vuid":"VU#598581","idnumber":"598581","name":"AT&T WinVNC server contains buffer overflow in Log.cpp","keywords":["AT&T","WinVNC","VNC","Log.cpp","DebugLevel","ReallyPrint()"],"overview":"A buffer overflow in the WinVNC server on Windows systems can allow an intruder to gain control of the VNC server and execute arbitrary code with the privileges of the user running the server.","clean_desc":"AT&T WinVNC is a free software package available from AT&T Labs Cambridge that allows users to interact with the desktop of a remote Windows host. By providing a specially crafted HTTP request to the VNC server, an attacker can overflow a buffer in Log.cpp, resulting in access to the VNC server and the ability to execute arbitrary code with the privileges of the user running the server. It is worth noting that the VNC server does not listen on 80/tcp by default. See the following url: http://www.uk.research.att.com/vnc/faq.html#q52","impact":"Local and remote users can execute arbitrary code with the privileges of the user running the server.","resolution":"","workarounds":"Apply this patch while inside the vnc_winsrc/winvnc\n  directory: --- Log.cpp Mon Jan 15 18:17:46 2001\n+++ Log.cpp Mon Jan 15 18:18:31 2001\n@@ -130,7 +130,7 @@ // - Write the log message\n  TCHAR line[LINE_BUFFER_SIZE]; -    vsprintf(line, format, ap); +    _vsnprintf(line, sizeof(line)-sizeof(TCHAR), format, ap); ReallyPrintLine(line);","sysaffected":"","thanks":"Our thanks to CORE SDI for the information contained in their bulletin.","author":"This document was written by Ian A. Finlay and is based on information obtained from a Core SDI Security Advisory.","public":["http://www.securityfocus.com/bid/2306","   http://www.uk.research.att.com/vnc/",""],"cveids":["CVE-2001-0168"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-01-30T01:15:08Z","publicdate":"2001-01-29T00:00:00Z","datefirstpublished":"2001-06-28T15:57:22Z","dateupdated":"2001-06-28T15:57:25Z","revision":32,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"14","cam_impact":"20","cam_easeofexploitation":"8","cam_attackeraccessrequired":"20","cam_scorecurrent":"12.6","cam_scorecurrentwidelyknown":"16.8","cam_scorecurrentwidelyknownexploited":"33.6","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":12.6,"vulnote":null}