Full Disclosure mailing list archives
GLSA: tightvnc (200302-15)
From: Daniel Ahlberg <aliz () gentoo org>
Date: Mon, 24 Feb 2003 12:34:16 +0100
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - --------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200302-15 - - --------------------------------------------------------------------- PACKAGE : tightvnc SUMMARY : insecure cookie generation DATE : 2003-02-24 11:34 UTC EXPLOIT : remote VERSIONS AFFECTED : <1.2.8 FIXED VERSION : 1.2.8 - - --------------------------------------------------------------------- - From Red Hat Security Advisory RHSA-2003:041-12: "The VNC server acts as an X server, but the script for starting it generates an MIT X cookie (which is used for X authentication) without using a strong enough random number generator. This could allow an attacker to be able to more easily guess the authentication cookie." Read the full advisory at: https://rhn.redhat.com/errata/RHSA-2003-041.html SOLUTION It is recommended that all Gentoo Linux users who are running net-misc/tightvnc upgrade to tightvnc-1.2.8 as follows: emerge sync emerge -u tightvnc emerge clean - - --------------------------------------------------------------------- aliz () gentoo org - GnuPG key is available at http://cvs.gentoo.org/~aliz - - --------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQE+WgMufT7nyhUpoZMRAiKmAJ4qnkKGdjD3mizWhjUmWTcXrM0aqACeOp45 r+jWLJSEsOaSmhXb73IYMPc= =Rml2 -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- GLSA: tightvnc (200302-15) Daniel Ahlberg (Feb 24)