First published: Thu May 05 2011(Updated: )
It was reported [1] that vncviewer could prompt for, and send, authentication credentials to a remote server without first properly validating the X.509 certificate. This could allow a malicious server to obtain a client's credentials because the client does not indicate to the user that a certificate is bad or missing. A proposed patch [2] is being discussed. [1] <a href="http://www.mail-archive.com/tigervnc-devel@lists.sourceforge.net/msg01342.html">http://www.mail-archive.com/tigervnc-devel@lists.sourceforge.net/msg01342.html</a> [2] <a href="http://www.mail-archive.com/tigervnc-devel@lists.sourceforge.net/msg01347.html">http://www.mail-archive.com/tigervnc-devel@lists.sourceforge.net/msg01347.html</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tigervnc Tigervnc | =1.1-beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.