Page 5 of 21 results (0.001 seconds)

CVSS: 5.8EPSS: 0%CPEs: 1EXPL: 0

The CSecurityTLS::processMsg function in common/rfb/CSecurityTLS.cxx in the vncviewer component in TigerVNC 1.1beta1 does not properly verify the server's X.509 certificate, which allows man-in-the-middle attackers to spoof a TLS VNC server via an arbitrary certificate. La función CSecurityTLS::processMsg en common/rtb/CSecurityTLS.cxx en el componente vncviewer en tigervnc v1.1beta1 no verifica de forma adecuada el certificado X.509 del servidor, lo que permite a ataques de Hombre en medio (man-in-the-middle) para falsificar un servidor TSL VNC mediante un certificado de su elección. • http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060567.html http://openwall.com/lists/oss-security/2011/05/06/2 http://openwall.com/lists/oss-security/2011/05/09/7 http://secunia.com/advisories/44939 http://www.mail-archive.com/tigervnc-devel%40lists.sourceforge.net/msg01342.html http://www.mail-archive.com/tigervnc-devel%40lists.sourceforge.net/msg01345.html http://www.mail-archive.com/tigervnc-devel%40lists.sourceforge.net/msg01347.html http://www.redhat.com/support • CWE-20: Improper Input Validation •