diff options
author | GLSAMaker <glsamaker@gentoo.org> | 2024-11-06 10:04:44 +0000 |
---|---|---|
committer | Hans de Graaff <graaff@gentoo.org> | 2024-11-06 11:04:59 +0100 |
commit | 0ee88a8a4a3b4d50f378796badcbe43c33747807 (patch) | |
tree | f23f8b811f5b22ce818e16dc4513997941fa8694 | |
parent | [ GLSA 202409-32 ] nginx: Multiple Vulnerabilities (diff) | |
download | glsa-0ee88a8a4a3b4d50f378796badcbe43c33747807.tar.gz glsa-0ee88a8a4a3b4d50f378796badcbe43c33747807.tar.bz2 glsa-0ee88a8a4a3b4d50f378796badcbe43c33747807.zip |
[ GLSA 202411-01 ] Neat VNC: Authentication Bypass
Bug: https://bugs.gentoo.org/937140
Signed-off-by: GLSAMaker <glsamaker@gentoo.org>
Signed-off-by: Hans de Graaff <graaff@gentoo.org>
-rw-r--r-- | glsa-202411-01.xml | 41 |
1 files changed, 41 insertions, 0 deletions
diff --git a/glsa-202411-01.xml b/glsa-202411-01.xml new file mode 100644 index 00000000..3cd99d6f --- /dev/null +++ b/glsa-202411-01.xml @@ -0,0 +1,41 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202411-01"> + <title>Neat VNC: Authentication Bypass</title> + <synopsis>A vulnerability has been discovered in Neat VNC, which can lead to authentication bypass.</synopsis> + <product type="ebuild">neatvnc</product> + <announced>2024-11-06</announced> + <revised count="1">2024-11-06</revised> + <bug>937140</bug> + <access>remote</access> + <affected> + <package name="gui-libs/neatvnc" auto="yes" arch="*"> + <unaffected range="ge">0.8.1</unaffected> + <vulnerable range="lt">0.8.1</vulnerable> + </package> + </affected> + <background> + <p>Neat VNC is a liberally licensed VNC server library that's intended to be fast and neat.</p> + </background> + <description> + <p>Neat VNC allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, as originally demonstrated using a long password.</p> + </description> + <impact type="high"> + <p>A remote attacker can opt not to use any authentication method and access the VNC server.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All Neat VNC users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=gui-libs/neatvnc-0.8.1" + </code> + </resolution> + <references> + </references> + <metadata tag="requester" timestamp="2024-11-06T10:04:44.010327Z">graaff</metadata> + <metadata tag="submitter" timestamp="2024-11-06T10:04:44.016422Z">graaff</metadata> +</glsa>
\ No newline at end of file |