Hi Roman

Thanks for the report. Sorry for the answer delay. This mail was hidden
among a number of auto-generated bugs so I did not spot it until today.
I'll have a look at this asap.

// Ola

On Fri, Mar 4, 2016 at 4:56 PM, <ro...@hodek.net> wrote:

> Package: vnc4
> Version: 4.1.1 X4.3.0-37.6 b1
> Tags: security,fixed-upstream
>
> Hello!
>
> Today I stumbled about the fact that the current Xvnc4 server delivered by
> Debian is vulnerable to a 10 year old security problem, namely
> CVE-2006-2369.
>
> In short: If a VNC password is configured, but a malicious VNC client
> nevertheless sends secType=authNone, it can proceed without password
> verification.
>
> This can be easily proved by building such a malicious client with the
> patch
> found here, for example:
> http://www.securityfocus.com/archive/1/archive/1/438175/100/0/threaded
>
> The CVE description claims the problem has been fixed in upstream version
> 4.1.2. So I'd suggest to either switch to that version, or to extract the
> secTypes fix from there.
>
> Thanks!
> Roman
>



-- 
 --- Inguza Technology AB --- MSc in Information Technology ----
/  o...@inguza.com                    Folkebogatan 26            \
|  o...@debian.org                   654 68 KARLSTAD            |
|  http://inguza.com/                Mobile: +46 (0)70-332 1551 |
\  gpg/f.p.: 7090 A92B 18FE 7994 0C36 4FE4 18A1 B1CF 0FE5 3DD9  /
 ---------------------------------------------------------------

Reply via email to