TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Tightvnc | Tightvnc | * | 2.8.75 (excluding) |
Tightvnc | Ubuntu | trusty | * |
Tightvnc | Ubuntu | xenial | * |