Overview
The RealVNC Server fails to properly authenticate clients. This may allow a remote attacker to bypass authentication and gain access to the VNC server.
Description
The Virtual Network Computing (VNC) Protocol According to RealVNC, "The VNC protocol is a simple protocol for remote access to graphical user interfaces."  | 
Impact
A remote, unauthenticated attacker could gain access to a system running RealVNC server. If the RealVNC server runs with administrative privileges, the attacker could gain complete control of the system.  | 
Solution
Upgrade  | 
  | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
- http://www.realvnc.com/howitworks.html
 - http://www.realvnc.com/products/free/4.1/winvnc.html#Security
 - http://www.realvnc.com/products/free/4.1/release-notes.html
 - http://www.realvnc.com/products/personal/4.2/release-notes.html
 - http://www.realvnc.com/products/enterprise/4.2/release-notes.html
 - http://marc.theaimsgroup.com/?l=bugtraq&m=114771408013890&w=2
 
Acknowledgements
This vulnerability was reported by James Evans.
This document was written by Jeff Gennari.
Other Information
| CVE IDs: | None | 
| Severity Metric: | 30.49 | 
| Date Public: | 2006-05-15 | 
| Date First Published: | 2006-05-16 | 
| Date Last Updated: | 2008-02-26 14:09 UTC | 
| Document Revision: | 47 |