First published: Wed Dec 11 2002(Updated: )
TightVNC before 1.2.6 generates the same challenge string for multiple connections, which allows remote attackers to bypass VNC authentication by sniffing the challenge and response of other users.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TightVNC | =1.2.4 | |
TightVNC | =1.2.0 | |
TightVNC | =1.2.1 | |
TightVNC | =1.2.3 | |
TightVNC | =1.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1336 is considered a high-severity vulnerability due to its potential for allowing unauthorized remote access.
To fix CVE-2002-1336, upgrade TightVNC to version 1.2.6 or later to ensure unique challenge strings for each connection.
TightVNC versions 1.2.0 through 1.2.5 are affected by CVE-2002-1336.
CVE-2002-1336 enables remote attackers to bypass VNC authentication by sniffing challenge and response data.
No, using TightVNC versions prior to 1.2.6 is not safe due to the vulnerability allowing potential unauthorized access.