TightVNC before 1.2.6 generates the same challenge string for multiple connections, which allows remote attackers to bypass VNC authentication by sniffing the challenge and response of other users.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Tightvnc | Tightvnc | 1.2.0 (including) | 1.2.0 (including) |
Tightvnc | Tightvnc | 1.2.1 (including) | 1.2.1 (including) |
Tightvnc | Tightvnc | 1.2.3 (including) | 1.2.3 (including) |
Tightvnc | Tightvnc | 1.2.4 (including) | 1.2.4 (including) |
Tightvnc | Tightvnc | 1.2.5 (including) | 1.2.5 (including) |
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 | RedHat | * | |
Red Hat Linux 7.0 | RedHat | * | |
Red Hat Linux 7.1 | RedHat | * | |
Red Hat Linux 7.2 | RedHat | * | |
Red Hat Linux 7.3 | RedHat | * | |
Red Hat Linux 8.0 | RedHat | * |