Package: vnc4
Version: 4.1.1 X4.3.0-37.6 b1
Tags: security,fixed-upstream

Hello!

Today I stumbled about the fact that the current Xvnc4 server delivered by
Debian is vulnerable to a 10 year old security problem, namely CVE-2006-2369.

In short: If a VNC password is configured, but a malicious VNC client
nevertheless sends secType=authNone, it can proceed without password
verification. 

This can be easily proved by building such a malicious client with the patch
found here, for example:
http://www.securityfocus.com/archive/1/archive/1/438175/100/0/threaded

The CVE description claims the problem has been fixed in upstream version
4.1.2. So I'd suggest to either switch to that version, or to extract the
secTypes fix from there.

Thanks!
Roman

Reply via email to