FreeBSD : vnc -- authentication bypass vulnerability (4645b98c-e46e-11da-9ae7-00123fcc6e5c)

high Nessus Plugin ID 21574

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

RealVNC is susceptible to an authentication-bypass vulnerability. A malicious VNC client can cause a VNC server to allow it to connect without any authentication regardless of the authentication settings configured in the server. Exploiting this issue allows attackers to gain unauthenticated, remote access to the VNC servers.

Solution

Update the affected package.

See Also

https://www.securityfocus.com/archive/1/433994/30/0/threaded

http://www.nessus.org/u?759aa26c

Plugin Details

Severity: High

ID: 21574

File Name: freebsd_pkg_4645b98ce46e11da9ae700123fcc6e5c.nasl

Version: 1.32

Type: local

Published: 5/19/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:vnc, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/18/2006

Vulnerability Publication Date: 5/15/2006

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2006-2369

BID: 17978