vendor:
RealVNC
by:
@fdiskyou
7,5
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: RealVNC
Affected Version From: 4.1.0
Affected Version To: 4.1.1
Patch Exists: YES
Related CWE: CVE-2006-2369
CPE: a:realvnc:realvnc:4.1.0
Metasploit:
https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0630/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2006-2450/, https://www.rapid7.com/db/vulnerabilities/freebsd-vid-9dda3ff1-2b02-11db-a6e2-000e0c2e438a/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2006-2450/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP
2012
RealVNC 4.1.0 and 4.1.1 Authentication Bypass Exploit
This exploit is a basic port of hdmoore/msf2 perl version to python for fun and profit (ease of use). It requires vncviewer installed and is tested on Windows XP. It uses a socket to connect to the target VNC service and sends a null authentication option to the client.
Mitigation:
Ensure that the VNC service is updated to the latest version.