How to Buy
This script is Copyright (C) 2011-2017 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated tigervnc packages that fix one security issue are now
available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having
moderate security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from
the CVE link in the References section.
Virtual Network Computing (VNC) is a remote display system which
allows you to view a computer's desktop environment not only on the
machine where it is running, but from anywhere on the Internet and
from a wide variety of machine architectures. TigerVNC is a suite of
VNC servers and clients.
It was discovered that vncviewer could prompt for and send
authentication credentials to a remote server without first properly
validating the server's X.509 certificate. As vncviewer did not
indicate that the certificate was bad or missing, a man-in-the-middle
attacker could use this flaw to trick a vncviewer client into
connecting to a spoofed VNC server, allowing the attacker to obtain
the client's credentials. (CVE-2011-1775)
All tigervnc users should upgrade to these updated packages, which
contain a backported patch to correct this issue.
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 5.8
CVSS Temporal Score : 4.8
Public Exploit Available : true
Family: Red Hat Local Security Checks
Nessus Plugin ID: 55160 ()
Bugtraq ID: 47738
CVE ID: CVE-2011-1775
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.