2 results (0.013 seconds)

CVSS: 10.0EPSS: 7%CPEs: 6EXPL: 0

The CMsgReader::readRect function in the VNC Viewer component in RealVNC VNC Free Edition 4.0 through 4.1.2, Enterprise Edition E4.0 through E4.4.2, and Personal Edition P4.0 through P4.4.2 allows remote VNC servers to execute arbitrary code via crafted RFB protocol data, related to "encoding type." La función CMsgReader::readRect en el componente VNC Viewer en RealVNC VNC Free Edition v4.0 hasta v4.1.2, Enterprise Edition vE4.0 hasta vE4.4.2, y Personal Edition vP4.0 hasta vP4.4.2 permite a servidores remotos VNC ejecutar código de su elección mediante el protocolo de datos RFB manipulado, relacionado con "tipo codificado". • http://secunia.com/advisories/32317 http://secunia.com/advisories/33689 http://secunia.com/advisories/34184 http://sunsolve.sun.com/search/document.do?assetkey=1-21-140455-01-1 http://sunsolve.sun.com/search/document.do?assetkey=1-26-248526-1 http://www.gentoo.org/security/en/glsa/glsa-200903-17.xml http://www.realvnc.com/pipermail/vnc-list/2008-November/059432.html http://www.realvnc.com/products/free/4.1/release-notes.html http://www.realvnc.com/products/upgrade.h • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 97%CPEs: 1EXPL: 7

RealVNC 4.1.1, and other products that use RealVNC such as AdderLink IP and Cisco CallManager, allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, as originally demonstrated using a long password. RealVNC 4.1.1 y otros productos que usan RealVNC tales como AdderLink IP y Cisco CallManager, permite a atacantes remotos eludir autenticación a través de una petición en la que el cliente especifica un tipo de seguridad insegura como "Type 1 - None", que es aceptada incluso si no es ofrecida por el servidor, como se demuestra originalmente usando una contraseña larga. Detect VNC servers that support the "None" authentication method. • https://www.exploit-db.com/exploits/1791 https://www.exploit-db.com/exploits/1794 https://www.exploit-db.com/exploits/36932 https://www.exploit-db.com/exploits/17719 http://marc.info/?l=full-disclosure&m=114768344111131&w=2 http://marc.info/?l=vnc-list&m=114755444130188&w=2 http://seclists.org/fulldisclosure/2022/May/29 http://secunia.com/advisories/20107 http://secunia.com/advisories/20109 http://secunia.com/advisories/20789 http://securityreason.com/securityalert • CWE-287: Improper Authentication •