Computer Security
[EN] securityvulns.ru
no-pyccku

  

RealVNC remote administration unauthroized access
updated since 15.05.2006
Published:08.08.2006
Source:
SecurityVulns ID:6142
Type:remote
Threat Level:
7/10
Description:Server doesn't check authentication type choosen by client is allowed.
Affected:REALVNC : RealVNC 4.1
 LIBVNCSERVER : LibVNCServer 0.7
 X11VNC : x11vnc 0.8
Original documentdocumentGENTOO, [Full-disclosure] [ GLSA 200608-12 ] x11vnc: Authentication bypass in included LibVNCServer code (08.08.2006)
 documentSECUNIA, [SA20940] LibVNCServer Authentication Bypass Vulnerability (14.07.2006)
 documentJames Evans, [Full-disclosure] RealVNC 4.1.1 Remote Compromise (15.05.2006)
Files:vnc scanner multithreaded windows
 vnc scanner multithreaded linux
 scan for OpenVNC 4.11 authentication bypass

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod

 
 
Links
Trey Knight
IC Diamond



Rating@Mail.ru