CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
75.5%
TightVNC before 1.2.6 generates the same challenge string for multiple connections, which allows remote attackers to bypass VNC authentication by sniffing the challenge and response of other users.
Vendor | Product | Version | CPE |
---|---|---|---|
tightvnc | tightvnc | 1.2.0 | cpe:2.3:a:tightvnc:tightvnc:1.2.0:*:*:*:*:*:*:* |
tightvnc | tightvnc | 1.2.1 | cpe:2.3:a:tightvnc:tightvnc:1.2.1:*:*:*:*:*:*:* |
tightvnc | tightvnc | 1.2.3 | cpe:2.3:a:tightvnc:tightvnc:1.2.3:*:*:*:*:*:*:* |
tightvnc | tightvnc | 1.2.4 | cpe:2.3:a:tightvnc:tightvnc:1.2.4:*:*:*:*:*:*:* |
tightvnc | tightvnc | 1.2.5 | cpe:2.3:a:tightvnc:tightvnc:1.2.5:*:*:*:*:*:*:* |
distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000640
marc.info/?l=bugtraq&m=102753170201524&w=2
marc.info/?l=bugtraq&m=102769183913594&w=2
www.mandrakesoft.com/security/advisories?name=MDKSA-2003:022
www.redhat.com/support/errata/RHSA-2002-287.html
www.redhat.com/support/errata/RHSA-2003-041.html
www.securityfocus.com/bid/5296
www.tightvnc.com/WhatsNew.txt
exchange.xforce.ibmcloud.com/vulnerabilities/5992