Vulnerabilities > CVE-2002-1336 - Unspecified vulnerability in Tightvnc

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
tightvnc
nessus

Summary

TightVNC before 1.2.6 generates the same challenge string for multiple connections, which allows remote attackers to bypass VNC authentication by sniffing the challenge and response of other users.

Nessus

  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2003-022.NASL
    descriptionA vulnerability was discovered in the VNC server script that generates an X cookie, used by X authentication. The script generated a cookie that was not strong enough and allow an attacker to more easily guess the authentication cookie, thus obtaining unauthorized access to the VNC server.
    last seen2020-06-01
    modified2020-06-02
    plugin id14007
    published2004-07-31
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/14007
    titleMandrake Linux Security Advisory : vnc (MDKSA-2003:022)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2002-287.NASL
    descriptionUpdated VNC packages are available to fix a challenge replay attack that is present in the VNC server. VNC is a tool for providing a remote graphical user interface. The VNC DES authentication scheme is implemented using a challenge-response architecture, producing a random and different challenge for each authentication attempt. A bug in the function for generating the random challenge caused the random seed to be reset to the current time on every authentication attempt. As a result, two authentication attempts within the same second could receive the same challenge. An eavesdropper could exploit this vulnerability by replaying the response, thereby gaining authentication. All users of VNC are advised to upgrade to these errata packages, which contain an updated version and are not vulnerable to this issue. Note that when using VNC on an untrusted network, always make sure to tunnel the VNC protocol through a secure, authenticated channel such as SSH. Instructions on how to tunnel VNC through SSH are provided at the following URL: http://www.uk.research.att.com/vnc/sshvnc.html
    last seen2020-06-01
    modified2020-06-02
    plugin id12339
    published2004-07-06
    reporterThis script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/12339
    titleRHEL 2.1 : vnc (RHSA-2002:287)

Redhat

advisories
  • rhsa
    idRHSA-2002:287
  • rhsa
    idRHSA-2003:041