Marc,

On systems which may have been compromised prior to upgrade, you should
follow these steps:

1)  Disconnect them from public networks.
2)  Run a full virus-scan on them.
3)  Install version 4.1.2.
4)  Configure a new VNC password.

Regards,

Wez @ RealVNC Ltd.
 

> -----Original Message-----
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf Of Marc
> Sent: 15 February 2007 16:55
> To: [email protected]
> Subject: Re: exploit in 4.1.2?
> 
> After the exploit was discussed and the recommendation was made 
> to install the updated code,  I went to every box and downloaded 
> the free edition to each machine. I don't have the version 
> number in front of me but this was a couple of months ago. 
> There was subsequent discussion on the list as to whether 
> someone who saw notice about the exploit was seeing the advisory 
> about the initial exploit or an exploit in a new version.
> 
> It looks to me like what I am seeing is either the remainder of 
> an earlier exploit taking advantage of a system after install of 
> the newer version,  or an exploit in the newer version.
> 
> Is there a detailed FAQ about clean up from the earlier exploit 
> to consult to make sure that it is not the former.....
> _______________________________________________
> VNC-List mailing list
> [email protected]
> To remove yourself from the list visit:
> http://www.realvnc.com/mailman/listinfo/vnc-list
_______________________________________________
VNC-List mailing list
[email protected]
To remove yourself from the list visit:
http://www.realvnc.com/mailman/listinfo/vnc-list

Reply via email to