Vulnerability Description
auth.c in LibVNCServer 0.7.1 allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, a different issue than CVE-2006-2369.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libvncserver | Libvncserver | 0.7.1 |
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=376824Patch
- http://libvncserver.cvs.sourceforge.net/libvncserver/libvncserver/libvncserver/aPatch
- http://seclists.org/fulldisclosure/2022/May/29
- http://secunia.com/advisories/20940PatchVendor Advisory
- http://secunia.com/advisories/21179
- http://secunia.com/advisories/21349
- http://secunia.com/advisories/21393
- http://secunia.com/advisories/21405
- http://secunia.com/advisories/24525
- http://security.gentoo.org/glsa/glsa-200608-05.xml
- http://security.gentoo.org/glsa/glsa-200608-12.xml
- http://security.gentoo.org/glsa/glsa-200703-19.xml
- http://sourceforge.net/project/shownotes.php?release_id=431724&group_id=32584Patch
- http://www.novell.com/linux/security/advisories/2006_42_kernel.html
- http://www.securityfocus.com/archive/1/442986/100/0/threaded
FAQ
What is CVE-2006-2450?
CVE-2006-2450 is a vulnerability with a CVSS score of 7.5 (HIGH). auth.c in LibVNCServer 0.7.1 allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if i...
How severe is CVE-2006-2450?
CVE-2006-2450 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-2450?
Check the references section above for vendor advisories and patch information. Affected products include: Libvncserver Libvncserver.