CVE-2006-2450

auth.c in LibVNCServer 0.7.1 allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, a different issue than CVE-2006-2369.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=376824 Patch
http://libvncserver.cvs.sourceforge.net/libvncserver/libvncserver/libvncserver/auth.c?r1=1.11&r2=1.14&diff_format=u Patch
http://seclists.org/fulldisclosure/2022/May/29
http://secunia.com/advisories/20940 Patch Vendor Advisory
http://secunia.com/advisories/21179
http://secunia.com/advisories/21349
http://secunia.com/advisories/21393
http://secunia.com/advisories/21405
http://secunia.com/advisories/24525
http://security.gentoo.org/glsa/glsa-200608-05.xml
http://security.gentoo.org/glsa/glsa-200608-12.xml
http://security.gentoo.org/glsa/glsa-200703-19.xml
http://sourceforge.net/project/shownotes.php?release_id=431724&group_id=32584 Patch
http://www.novell.com/linux/security/advisories/2006_42_kernel.html
http://www.securityfocus.com/archive/1/442986/100/0/threaded
http://www.securityfocus.com/bid/18977
http://www.vupen.com/english/advisories/2006/2797
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=376824 Patch
http://libvncserver.cvs.sourceforge.net/libvncserver/libvncserver/libvncserver/auth.c?r1=1.11&r2=1.14&diff_format=u Patch
http://seclists.org/fulldisclosure/2022/May/29
http://secunia.com/advisories/20940 Patch Vendor Advisory
http://secunia.com/advisories/21179
http://secunia.com/advisories/21349
http://secunia.com/advisories/21393
http://secunia.com/advisories/21405
http://secunia.com/advisories/24525
http://security.gentoo.org/glsa/glsa-200608-05.xml
http://security.gentoo.org/glsa/glsa-200608-12.xml
http://security.gentoo.org/glsa/glsa-200703-19.xml
http://sourceforge.net/project/shownotes.php?release_id=431724&group_id=32584 Patch
http://www.novell.com/linux/security/advisories/2006_42_kernel.html
http://www.securityfocus.com/archive/1/442986/100/0/threaded
http://www.securityfocus.com/bid/18977
http://www.vupen.com/english/advisories/2006/2797
Configurations

Configuration 1 (hide)

cpe:2.3:a:libvncserver:libvncserver:0.7.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:11

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=376824 - Patch () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=376824 - Patch
References () http://libvncserver.cvs.sourceforge.net/libvncserver/libvncserver/libvncserver/auth.c?r1=1.11&r2=1.14&diff_format=u - Patch () http://libvncserver.cvs.sourceforge.net/libvncserver/libvncserver/libvncserver/auth.c?r1=1.11&r2=1.14&diff_format=u - Patch
References () http://seclists.org/fulldisclosure/2022/May/29 - () http://seclists.org/fulldisclosure/2022/May/29 -
References () http://secunia.com/advisories/20940 - Patch, Vendor Advisory () http://secunia.com/advisories/20940 - Patch, Vendor Advisory
References () http://secunia.com/advisories/21179 - () http://secunia.com/advisories/21179 -
References () http://secunia.com/advisories/21349 - () http://secunia.com/advisories/21349 -
References () http://secunia.com/advisories/21393 - () http://secunia.com/advisories/21393 -
References () http://secunia.com/advisories/21405 - () http://secunia.com/advisories/21405 -
References () http://secunia.com/advisories/24525 - () http://secunia.com/advisories/24525 -
References () http://security.gentoo.org/glsa/glsa-200608-05.xml - () http://security.gentoo.org/glsa/glsa-200608-05.xml -
References () http://security.gentoo.org/glsa/glsa-200608-12.xml - () http://security.gentoo.org/glsa/glsa-200608-12.xml -
References () http://security.gentoo.org/glsa/glsa-200703-19.xml - () http://security.gentoo.org/glsa/glsa-200703-19.xml -
References () http://sourceforge.net/project/shownotes.php?release_id=431724&group_id=32584 - Patch () http://sourceforge.net/project/shownotes.php?release_id=431724&group_id=32584 - Patch
References () http://www.novell.com/linux/security/advisories/2006_42_kernel.html - () http://www.novell.com/linux/security/advisories/2006_42_kernel.html -
References () http://www.securityfocus.com/archive/1/442986/100/0/threaded - () http://www.securityfocus.com/archive/1/442986/100/0/threaded -
References () http://www.securityfocus.com/bid/18977 - () http://www.securityfocus.com/bid/18977 -
References () http://www.vupen.com/english/advisories/2006/2797 - () http://www.vupen.com/english/advisories/2006/2797 -

Information

Published : 2006-07-18 15:40

Updated : 2024-11-21 00:11


NVD link : CVE-2006-2450

Mitre link : CVE-2006-2450

CVE.ORG link : CVE-2006-2450


JSON object : View

Products Affected

libvncserver

  • libvncserver