Re: [Full-disclosure] RealVNC 4.1.1 Remote Compromise

2006-06-09 Thread Jose Ramirez
This is a problem for version 4.1.1 only, so if you have earlier versions you must not worry about it. http://isc.sans.org/diary.php?storyid=1331 Jose Ramirez Quoting Ray Van Dolson <[EMAIL PROTECTED]>: On Mon, Jun 05, 2006 at 05:33:29PM -0600, Kurt Seifried wrote: >How is it that even thou

Re: [Full-disclosure] RealVNC 4.1.1 Remote Compromise

2006-06-07 Thread Bojan Zdrnja
On 6/6/06, Kurt Seifried <[EMAIL PROTECTED]> wrote: > How is it that even though this vulnerability has been known now for > some time, Red Hat still has not issued a new package or security update > that addresses this? On RHN, the most recent package I can find is > 4.0.0 beta and the most rec

Re: [Full-disclosure] RealVNC 4.1.1 Remote Compromise

2006-06-07 Thread Ray Van Dolson
On Mon, Jun 05, 2006 at 05:33:29PM -0600, Kurt Seifried wrote: > >How is it that even though this vulnerability has been known now for > >some time, Red Hat still has not issued a new package or security update > >that addresses this? On RHN, the most recent package I can find is > >4.0.0 beta and

Re: [Full-disclosure] RealVNC 4.1.1 Remote Compromise

2006-06-06 Thread Kurt Seifried
How is it that even though this vulnerability has been known now for some time, Red Hat still has not issued a new package or security update that addresses this? On RHN, the most recent package I can find is 4.0.0 beta and the most recent security patch for VNC dates back to December 2004. Sinc

Re: [Full-disclosure] RealVNC 4.1.1 Remote Compromise

2006-06-05 Thread Tobias Kreidl
How is it that even though this vulnerability has been known now for some time, Red Hat still has not issued a new package or security update that addresses this? On RHN, the most recent package I can find is 4.0.0 beta and the most recent security patch for VNC dates back to December 2004. Since

Re: [Full-disclosure] RealVNC 4.1.1 Remote Compromise

2006-05-20 Thread Matt Venzke
I hacked your code into something multi-threaded--enjoy. - Matt #!/usr/bin/perl # Multi-threaded scan for OpenVNC 4.11 authentication bypass. # Based on Tyler Krpata's Perl scanning code. use strict; use warnings; use IO::Socket; use threads; use threads::shared; use Errno qw(EAGAIN); # Config

RE: [Full-disclosure] RealVNC 4.1.1 Remote Compromise

2006-05-19 Thread Krpata, Tyler
Here's a real quick vulnerability check in Perl...I think someone else put out another scanner, but there was no source provided and it wasn't working right for me. #!/usr/bin/perl # scan for OpenVNC 4.1

Re: [Full-disclosure] RealVNC 4.1.1 Remote Compromise

2006-05-18 Thread Joachim Schipper
On Mon, May 15, 2006 at 07:58:10AM -0500, Dixon, Wayne wrote: > So what can be done about this exploit? Does 4.1.2 protect against this > vulnerability? And what other mitigation procedures are available for > this? The best solution is not to run a VNC service using no more than it's own authen

re: RealVNC 4.1.1 Remote Compromise

2006-05-16 Thread plato
Wow, 1 line of code addition to exploit: secType=1; Since I'm sure many have already discovered this (since it is so trivial), I leave it up to the devious reader to find out where to insert this. BTW: RealVNC 4.1.2 is not affected by this bug. ** Disclaimer: If you find out how to exp

Re: [Full-disclosure] RealVNC 4.1.1 Remote Compromise

2006-05-15 Thread Juha-Matti Laurio
To share information about the new Release Notes document: this issue has been fixed in version 4.1.2 (Free Edition) http://www.realvnc.com/products/free/4.1/release-notes.html http://www.realvnc.com/download.html - Juha-Matti

RealVNC 4.1.1 Remote Compromise

2006-05-15 Thread James Evans
Rumors of this bug began spreading on Slashdot and other sites, thanks to Steve Wiseman of intelliadmin.com who serendipitously discovered it while writing a VNC client. At first it was only a rumor, as Steve's site gave scant details and he himself was surprised such a huge hole could possibly ex