Overview
The RealVNC Server fails to properly authenticate clients. This may allow a remote attacker to bypass authentication and gain access to the VNC server.
Description
The Virtual Network Computing (VNC) Protocol According to RealVNC, "The VNC protocol is a simple protocol for remote access to graphical user interfaces." |
Impact
A remote, unauthenticated attacker could gain access to a system running RealVNC server. If the RealVNC server runs with administrative privileges, the attacker could gain complete control of the system. |
Solution
Upgrade |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.realvnc.com/howitworks.html
- http://www.realvnc.com/products/free/4.1/winvnc.html#Security
- http://www.realvnc.com/products/free/4.1/release-notes.html
- http://www.realvnc.com/products/personal/4.2/release-notes.html
- http://www.realvnc.com/products/enterprise/4.2/release-notes.html
- http://marc.theaimsgroup.com/?l=bugtraq&m=114771408013890&w=2
Acknowledgements
This vulnerability was reported by James Evans.
This document was written by Jeff Gennari.
Other Information
CVE IDs: | None |
Severity Metric: | 30.49 |
Date Public: | 2006-05-15 |
Date First Published: | 2006-05-16 |
Date Last Updated: | 2008-02-26 14:09 UTC |
Document Revision: | 47 |