TightVNC before 1.2.6 generates the same challenge string for multiple connections, which allows remote attackers to bypass VNC authentication by sniffing the challenge and response of other users.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Tightvnc | Tightvnc | 1.2.0 (including) | 1.2.0 (including) |
| Tightvnc | Tightvnc | 1.2.1 (including) | 1.2.1 (including) |
| Tightvnc | Tightvnc | 1.2.3 (including) | 1.2.3 (including) |
| Tightvnc | Tightvnc | 1.2.4 (including) | 1.2.4 (including) |
| Tightvnc | Tightvnc | 1.2.5 (including) | 1.2.5 (including) |
| Red Hat Enterprise Linux AS (Advanced Server) version 2.1 | RedHat | * | |
| Red Hat Linux 7.0 | RedHat | * | |
| Red Hat Linux 7.1 | RedHat | * | |
| Red Hat Linux 7.2 | RedHat | * | |
| Red Hat Linux 7.3 | RedHat | * | |
| Red Hat Linux 8.0 | RedHat | * |