Vulnerability Details : CVE-2001-0167
Public exploit exists!
Buffer overflow in AT&T WinVNC (Virtual Network Computing) client 3.3.3r7 and earlier allows remote attackers to execute arbitrary commands via a long rfbConnFailed packet with a long reason string.
Vulnerability category: Overflow
Exploit prediction scoring system (EPSS) score for CVE-2001-0167
Probability of exploitation activity in the next 30 days: 9.51%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 94 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2001-0167
-
RealVNC 3.3.7 Client Buffer Overflow
Disclosure Date: 2001-01-29First seen: 2020-04-26exploit/windows/vnc/realvnc_clientThis module exploits a buffer overflow in RealVNC 3.3.7 (vncviewer.exe). Authors: - MC <mc@metasploit.com>
CVSS scores for CVE-2001-0167
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.6
|
HIGH | AV:N/AC:H/Au:N/C:C/I:C/A:C |
4.9
|
10.0
|
NIST |
References for CVE-2001-0167
-
http://www.securityfocus.com/bid/2305
AT&T WinVNC Client Buffer Overflow VulnerabilityPatch;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/6025
-
http://marc.info/?l=bugtraq&m=98088315825366&w=2
Products affected by CVE-2001-0167
- cpe:2.3:a:att:winvnc:*:*:*:*:*:*:*:*