| Summary: | vncviewer can send password to server without proper validation of the X.509 certificate | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Stew Benedict <stewbintn> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | normal | ||
| Priority: | Normal | CC: | davidwhodgins, dmorganec, elegant.pegasus, mageia, marja11, stormi-mageia, sysadmin-bugs, tmb |
| Version: | 1 | Keywords: | Security, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Source RPM: | tigervnc-1.0.90-0.201012034210.6.mga1.src.rpm | CVE: | |
| Status comment: | |||
|
Description
Stew Benedict
2011-06-29 13:25:03 CEST
2 months, no triage, no interest, closing Status:
NEW =>
RESOLVED Mageia 1 is not EOL yet! Status:
RESOLVED =>
REOPENED
Remco Rijnders
2011-08-29 18:53:25 CEST
Keywords:
(none) =>
Security patching in progress package in update_testing Assignee:
dmorganec =>
qa-bugs i take back this bug, the package doesn't build. CC:
(none) =>
dmorganec ping for this security issue. CC:
(none) =>
stormi Ping ? Ping ? Ping ? On the mageia-discuss ml another possible issue was mentioned and Florian reacted:
Am 07.12.2011 09:40, schrieb Kira:
> > One of the user from Taiwan reported that he can't
> >
> > get keyboard working with xrdp/tigervnc-server.
> >
> > Mouse works, Some keys like Enter works, but
> >
> > a~z, 1~0 don't.Any help?
> >
Should be looked at, and could be fixed together when fixing
tigervnc buildCC:
(none) =>
marja11
Marja Van Waes
2011-12-09 15:51:03 CET
CC:
(none) =>
elegant.pegasus i just pushed a new version 1.1.0 into cauldron and mageia 1. I assign the bug to QA, if the package doesn't build ( it builds OK in cauldron ) then please reassign it to me. Assignee:
dmorganec =>
qa-bugs Has vncviewer been updated? All I can see is tigervnc. Isn't this different? tigervnc provides vncviewer, sorry for the noise. I thought it was s separate CLI utility. Testing on i586 complete for the srpm tigervnc-1.1.0-0.1.mga1.src.rpm I don't have a POC for testing the exploit, so just confirming the program works. For testing, I used ssh to login to an account that has an x session already running on the local system, then used x0vncserver display=:0 -SecurityTypes=None & vncviewer -compresslevel 9 localhost:0 to take over the x session. CC:
(none) =>
davidwhodgins someone to test on x86_64 please ? Testing complete on x86_64 with using the vnc server of virt-manager/kvm Suggested Advisory: ------------- It was discovered that vncviewer could prompt for and send authentication credentials to a remote server without first properly validating the server's X.509 certificate. As vncviewer did not indicate that the certificate was bad or missing, a man-in-the-middle attacker could use this flaw to trick a vncviewer client into connecting to a spoofed VNC server, allowing the attacker to obtain the client's credentials. This issue is identified at mitre.org by CVE-2011-1775. Updated packages correct this issue. https://bugs.mageia.org/show_bug.cgi?id=1963 ------------- SRPM: tigervnc-1.1.0-0.1.mga1.src.rpm Could sysadmin please push from core/updates_testing to core/updates Thankyou! Keywords:
(none) =>
validated_update Update pushed. Status:
REOPENED =>
RESOLVED |