TightVNC before 1.2.6 generates the same challenge string for multiple connections, which allows remote attackers to bypass VNC authentication by sniffing the challenge and response of other users.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/5992 | vdb entry |
http://www.redhat.com/support/errata/RHSA-2002-287.html | vendor advisory |
http://marc.info/?l=bugtraq&m=102753170201524&w=2 | mailing list |
http://www.redhat.com/support/errata/RHSA-2003-041.html | vendor advisory |
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:022 | vendor advisory |
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000640 | vendor advisory |
http://www.tightvnc.com/WhatsNew.txt | |
http://marc.info/?l=bugtraq&m=102769183913594&w=2 | mailing list |
http://www.securityfocus.com/bid/5296 | vdb entry |