blob: 1f4a8436d2ed3fdcd409b3e3a76b5b38bb5ee303 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200608-05">
<title>LibVNCServer: Authentication bypass</title>
VNC servers created with LibVNCServer accept insecure protocol types, even
when the server does not offer it, resulting in unauthorized access to the
<product type="ebuild">libvncserver</product>
<announced>August 04, 2006</announced>
<revised>August 04, 2006: 01</revised>
<package name="net-libs/libvncserver" auto="yes" arch="*">
<unaffected range="ge">0.8.2</unaffected>
<vulnerable range="lt">0.8.2</vulnerable>
LibVNCServer is a GPL'ed library for creating VNC servers.
LibVNCServer fails to properly validate protocol types effectively
letting users decide what protocol to use, such as "Type 1 - None".
LibVNCServer will accept this security type, even if it is not offered
by the server.
<impact type="high">
An attacker could use this vulnerability to gain unauthorized access
with the privileges of the user running the VNC server.
There is no known workaround at this time.
All LibVNCServer users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-libs/libvncserver-0.8.2&quot;</code>
<uri link="">CVE-2006-2450</uri>
<metadata tag="requester" timestamp="Sat, 29 Jul 2006 16:47:24 +0000">
<metadata tag="bugReady" timestamp="Sat, 29 Jul 2006 16:50:23 +0000">
<metadata tag="submitter" timestamp="Mon, 31 Jul 2006 01:51:07 +0000">