Vulnerabilities > CVE-2001-0167 - Buffer Overflow vulnerability in AT&T; WinVNC Client

047910
CVSS 7.6 - HIGH
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
high complexity
att
exploit available
metasploit

Summary

Buffer overflow in AT&T WinVNC (Virtual Network Computing) client 3.3.3r7 and earlier allows remote attackers to execute arbitrary commands via a long rfbConnFailed packet with a long reason string.

Vulnerable Configurations

Part Description Count
Application
Att
1

Exploit-Db

descriptionRealVNC 3.3.7 Client Buffer Overflow. CVE-2001-0167. Remote exploit for windows platform
idEDB-ID:16489
last seen2016-02-01
modified2010-04-30
published2010-04-30
reportermetasploit
sourcehttps://www.exploit-db.com/download/16489/
titleRealVNC 3.3.7 - Client Buffer Overflow

Metasploit

descriptionThis module exploits a buffer overflow in RealVNC 3.3.7 (vncviewer.exe).
idMSF:EXPLOIT/WINDOWS/VNC/REALVNC_CLIENT
last seen2020-04-11
modified2017-07-24
published2006-12-14
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0167
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/vnc/realvnc_client.rb
titleRealVNC 3.3.7 Client Buffer Overflow

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/83177/realvnc_client.rb.txt
idPACKETSTORM:83177
last seen2016-12-05
published2009-11-26
reporterMC
sourcehttps://packetstormsecurity.com/files/83177/RealVNC-3.3.7-Client-Buffer-Overflow.html
titleRealVNC 3.3.7 Client Buffer Overflow