GLSA: vnc (200302-16)

From: Daniel Ahlberg (alizat_private)
Date: Mon Feb 24 2003 - 03:35:16 PST

  • Next message: Forrest J. Cavalier III: "Platform independent allocating sprintf (was Re: buffer overrun"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - - ---------------------------------------------------------------------
    GENTOO LINUX SECURITY ANNOUNCEMENT 200302-16
    - - ---------------------------------------------------------------------
    
              PACKAGE : vnc
              SUMMARY : insecure cookie generation
                 DATE : 2003-02-24 11:35 UTC
              EXPLOIT : remote
    VERSIONS AFFECTED : <3.3.6-r1
        FIXED VERSION : 3.3.6-r1
    
    - - ---------------------------------------------------------------------
    
    - From Red Hat Security Advisory RHSA-2003:041-12:
    
    "The VNC server acts as an X server, but the script for starting it 
    generates an MIT X cookie (which is used for X authentication) without 
    using a strong enough random number generator.  This could allow an 
    attacker to be able to more easily guess the authentication cookie."
    
    Read the full advisory at:
    https://rhn.redhat.com/errata/RHSA-2003-041.html
    
    SOLUTION
    
    It is recommended that all Gentoo Linux users who are running
    net-misc/vnc upgrade to vnc-3.3.6-r1 as follows:
    
    emerge sync
    emerge -u vnc
    emerge clean
    
    - - ---------------------------------------------------------------------
    alizat_private - GnuPG key is available at http://cvs.gentoo.org/~aliz
    - - ---------------------------------------------------------------------
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.2.1 (GNU/Linux)
    
    iD8DBQE+WgNxfT7nyhUpoZMRAjgdAKCkBB7XPF4iXhpPvHW9YQ0lTrTKIACeLKjx
    wcygjjWoyxpABWAfLk4BX1A=
    =HPqI
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Mon Feb 24 2003 - 15:20:06 PST