Short Name |
VNC:OVERFLOW:RSN-TOO-LONG |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
VNC |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This protocol anomaly detects a VNC reason string length that exceeds the user-defined maximum. A reason string contains the text that describes the reason a connection between a VNC server and client failed. The default reason string maximum is 512; you can change this setting in the Sensor Settings Rulebase>Protocol Thresholds and Configuration>VNC>Reason string length.
Multiple VNC clients are prone to integer-overflow vulnerabilities because they fail to properly validate data supplied by the VNC server. An attacker can exploit these issues to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in denial-of-service conditions. The following are vulnerable to these issues; UltraVNC prior to 1.0.5.4 TightVNC prior to 1.3.10 Other VNC applications may also be affected.