Vulnerabilities > CVE-2001-0168 - Buffer Overflow vulnerability in AT&T; WinVNC Server

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
att
critical
exploit available
metasploit

Summary

Buffer overflow in AT&T WinVNC (Virtual Network Computing) server 3.3.3r7 and earlier allows remote attackers to execute arbitrary commands via a long HTTP GET request when the DebugLevel registry key is greater than 0.

Vulnerable Configurations

Part Description Count
Application
Att
1

Exploit-Db

descriptionWinVNC Web Server. CVE-2001-0168. Remote exploit for windows platform
idEDB-ID:16491
last seen2016-02-01
modified2009-12-06
published2009-12-06
reportermetasploit
sourcehttps://www.exploit-db.com/download/16491/
titleWinVNC Web Server <= 3.3.3r7 - GET Overflow

Metasploit

descriptionThis module exploits a buffer overflow in the AT&amp;T; WinVNC version <= v3.3.3r7 web server. When debugging mode with logging is enabled (non-default), an overly long GET request can overwrite the stack. This exploit does not work well with VNC payloads!
idMSF:EXPLOIT/WINDOWS/VNC/WINVNC_HTTP_GET
last seen2020-05-23
modified2017-11-08
published2008-06-03
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0168
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/vnc/winvnc_http_get.rb
titleWinVNC Web Server GET Overflow

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/83084/winvnc_http_get.rb.txt
idPACKETSTORM:83084
last seen2016-12-05
published2009-11-26
reporterpatrick
sourcehttps://packetstormsecurity.com/files/83084/WinVNC-Web-Server-v3.3.3r7-GET-Overflow.html
titleWinVNC Web Server <= v3.3.3r7 GET Overflow