This script is Copyright (C) 2006-2014 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200608-05
(LibVNCServer: Authentication bypass)
LibVNCServer fails to properly validate protocol types effectively
letting users decide what protocol to use, such as 'Type 1 - None'.
LibVNCServer will accept this security type, even if it is not offered
by the server.
An attacker could use this vulnerability to gain unauthorized access
with the privileges of the user running the VNC server.
There is no known workaround at this time.
See also :
All LibVNCServer users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-libs/libvncserver-0.8.2'
Risk factor :
High / CVSS Base Score : 7.5
Family: Gentoo Local Security Checks
Nessus Plugin ID: 22147 (gentoo_GLSA-200608-05.nasl)
CVE ID: CVE-2006-2450