GLSA: tightvnc (200302-15)

From: Daniel Ahlberg (alizat_private)
Date: Mon Feb 24 2003 - 03:34:15 PST

  • Next message: Pui Kin Ser: "Vulnerability for Platinum FTP version 1.0.11"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - - ---------------------------------------------------------------------
    GENTOO LINUX SECURITY ANNOUNCEMENT 200302-15
    - - ---------------------------------------------------------------------
    
              PACKAGE : tightvnc
              SUMMARY : insecure cookie generation
                 DATE : 2003-02-24 11:34 UTC
              EXPLOIT : remote
    VERSIONS AFFECTED : <1.2.8
        FIXED VERSION : 1.2.8
    
    - - ---------------------------------------------------------------------
    
    - From Red Hat Security Advisory RHSA-2003:041-12:
    
    "The VNC server acts as an X server, but the script for starting it 
    generates an MIT X cookie (which is used for X authentication) without 
    using a strong enough random number generator.  This could allow an 
    attacker to be able to more easily guess the authentication cookie."
    
    Read the full advisory at:
    https://rhn.redhat.com/errata/RHSA-2003-041.html
    
    SOLUTION
    
    It is recommended that all Gentoo Linux users who are running
    net-misc/tightvnc upgrade to tightvnc-1.2.8 as follows:
    
    emerge sync
    emerge -u tightvnc
    emerge clean
    
    - - ---------------------------------------------------------------------
    alizat_private - GnuPG key is available at http://cvs.gentoo.org/~aliz
    - - ---------------------------------------------------------------------
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.2.1 (GNU/Linux)
    
    iD8DBQE+WgMufT7nyhUpoZMRAiKmAJ4qnkKGdjD3mizWhjUmWTcXrM0aqACeOp45
    r+jWLJSEsOaSmhXb73IYMPc=
    =Rml2
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Mon Feb 24 2003 - 10:45:00 PST