qemu-kvm before 0.11.0 disables VNC authentication when the password is cleared, which allows remote attackers to bypass authentication and establish VNC sessions.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://secunia.com/advisories/43733 | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2011/01/11/1 | mailing list |
http://www.openwall.com/lists/oss-security/2011/01/12/2 | mailing list |
http://secunia.com/advisories/44393 | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2011/01/10/3 | mailing list |
http://rhn.redhat.com/errata/RHSA-2011-0345.html | vendor advisory |
http://www.osvdb.org/70992 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65215 | vdb entry |
http://secunia.com/advisories/42830 | third party advisory vendor advisory |
http://ubuntu.com/usn/usn-1063-1 | vendor advisory |
https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/697197 | |
http://secunia.com/advisories/43272 | third party advisory vendor advisory |