Package: vnc4
Version: 4.1.1+X4.3.0-19
Severity: grave
Tags: security

RealVNC 4.1.2 was released to plug holes in authentication handling.  
Quoting the CVE:

'allows remote attackers to bypass authentication via a request in which 
the client specifies an insecure security type such as "Type 1 - None", 
which is accepted even if it is not offered by the server...'

http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2006-2369
http://www.realvnc.com/products/free/4.1/release-notes.html

-- 
Kees Cook                                            @outflux.net


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to