Vulnerability Note VU#117929
RealVNC Server does not validate client authentication method
Overview
The RealVNC Server fails to properly authenticate clients. This may allow a remote attacker to bypass authentication and gain access to the VNC server.
Description
The Virtual Network Computing (VNC) Protocol According to RealVNC, "The VNC protocol is a simple protocol for remote access to graphical user interfaces." |
Impact
A remote, unauthenticated attacker could gain access to a system running RealVNC server. If the RealVNC server runs with administrative privileges, the attacker could gain complete control of the system. |
Solution
Upgrade |
|
Systems Affected (Learn More)
| Vendor | Status | Date Notified | Date Updated |
|---|---|---|---|
| RealVNC | Affected | - | 16 May 2006 |
| Red Hat, Inc. | Not Affected | - | 17 May 2006 |
CVSS Metrics (Learn More)
| Group | Score | Vector |
|---|---|---|
| Base | N/A | N/A |
| Temporal | N/A | N/A |
| Environmental | N/A | N/A |
References
- http://www.realvnc.com/howitworks.html
- http://www.realvnc.com/products/free/4.1/winvnc.html#Security
- http://www.realvnc.com/products/free/4.1/release-notes.html
- http://www.realvnc.com/products/personal/4.2/release-notes.html
- http://www.realvnc.com/products/enterprise/4.2/release-notes.html
- http://marc.theaimsgroup.com/?l=bugtraq&m=114771408013890&w=2
Credit
This vulnerability was reported by James Evans.
This document was written by Jeff Gennari.
Other Information
- CVE IDs: Unknown
- Date Public: 15 May 2006
- Date First Published: 16 May 2006
- Date Last Updated: 26 Feb 2008
- Severity Metric: 30.49
- Document Revision: 47
Feedback
If you have feedback, comments, or additional information about this vulnerability, please send us email.