Security consultant and researcher
Long experience in designing and implementation of security solutions, mainly oriented on web, mobile and embedded applications. Author of penetration testing tools, recognized by OWASP organization and BackTrack Linux distribution. Researching work includes discovery of vulnerabilities of numeral applications and services, and for these, author received public apreciations by Microsoft Company..
A vulnerability has been discovered in UltraVNC Viewer, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to the application loading libraries (e.g. vnclang.dll) in an insecure manner. This can be exploited to load arbitrary libraries by tricking a user into e.g. opening a VNC file located on a remote WebDAV or SMB share.
Successful exploitation allows execution of arbitrary code, but requires that the application during installation was configured to be associated with VNC files (non-default option).
The vulnerability is confirmed in version 184.108.40.206. Other versions may also be affected.
Do not open untrusted files.
PROVIDED AND/OR DISCOVERED BY: