Vulnerabilities > CVE-2001-0167 - Unspecified vulnerability in ATT Winvnc

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
att
exploit available
metasploit

Summary

Buffer overflow in AT&T WinVNC (Virtual Network Computing) client 3.3.3r7 and earlier allows remote attackers to execute arbitrary commands via a long rfbConnFailed packet with a long reason string.

Vulnerable Configurations

Part Description Count
Application
Att
1

Exploit-Db

descriptionRealVNC 3.3.7 Client Buffer Overflow. CVE-2001-0167. Remote exploit for windows platform
idEDB-ID:16489
last seen2016-02-01
modified2010-04-30
published2010-04-30
reportermetasploit
sourcehttps://www.exploit-db.com/download/16489/
titleRealVNC 3.3.7 - Client Buffer Overflow

Metasploit

descriptionThis module exploits a buffer overflow in RealVNC 3.3.7 (vncviewer.exe).
idMSF:EXPLOIT/WINDOWS/VNC/REALVNC_CLIENT
last seen2020-04-11
modified2017-07-24
published2006-12-14
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0167
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/vnc/realvnc_client.rb
titleRealVNC 3.3.7 Client Buffer Overflow

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/83177/realvnc_client.rb.txt
idPACKETSTORM:83177
last seen2016-12-05
published2009-11-26
reporterMC
sourcehttps://packetstormsecurity.com/files/83177/RealVNC-3.3.7-Client-Buffer-Overflow.html
titleRealVNC 3.3.7 Client Buffer Overflow