GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Fri Aug 04, 2006 6:26 am Post subject: [ GLSA 200608-05 ] LibVNCServer: Authentication bypass |
|
|
Gentoo Linux Security Advisory
Title: LibVNCServer: Authentication bypass (GLSA 200608-05)
Severity: high
Exploitable: remote
Date: August 04, 2006
Bug(s): #136916
ID: 200608-05
Synopsis
VNC servers created with LibVNCServer accept insecure protocol types, even
when the server does not offer it, resulting in unauthorized access to the
server.
Background
LibVNCServer is a GPL'ed library for creating VNC servers.
Affected Packages
Package: net-libs/libvncserver
Vulnerable: < 0.8.2
Unaffected: >= 0.8.2
Architectures: All supported architectures
Description
LibVNCServer fails to properly validate protocol types effectively
letting users decide what protocol to use, such as "Type 1 - None".
LibVNCServer will accept this security type, even if it is not offered
by the server.
Impact
An attacker could use this vulnerability to gain unauthorized access
with the privileges of the user running the VNC server.
Workaround
There is no known workaround at this time.
Resolution
All LibVNCServer users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=net-libs/libvncserver-0.8.2" |
References
CVE-2006-2450
Last edited by GLSA on Sun May 25, 2014 4:23 am; edited 4 times in total |
|