RealVNC VNC Viewer < 4.1.3/4.4.3 Arbitrary Command Execution

High Nessus Plugin ID 34461


The remote Windows host has an application that may allow execution of arbitrary code.


The version of RealVNC's VNC Viewer installed on the remote Windows host is affected by multiple issues :

- An error in the 'CMsgReader::readRect()' function in 'common/rfb/CMsgReader.cxx' that comes into play when processing encoding types, may allow arbitrary code execution on the remote system. If an attacker can trick a user on the remote host into connecting to a malicious server, he can exploit this issue using specially crafted messages to compromise that host.

- By tricking a user to connect to a malicious VNC server, it may be possible for an attacker to execute arbitrary code on a remote system by sending malicious RFB protocol data to the remote VNC Viewer component. Note VNC servers are not affected by this issue.


Upgrade to RealVNC VNC Viewer Free Edition 4.1.3 / Personal Edition 4.4.3 / Enterprise Edition 4.4.3 or later.

See Also

Plugin Details

Severity: High

ID: 34461

File Name: realvnc_4_1_3.nasl

Version: $Revision: 1.12 $

Type: local

Agent: windows

Family: Windows

Published: 2008/10/21

Modified: 2016/05/16

Dependencies: 13855, 10456

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:realvnc:realvnc

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

CVE: CVE-2008-4770

BID: 31832, 33263

OSVDB: 50050

Secunia: 32317

CWE: 20