CVE-2006-2369
Summary
| CVE | CVE-2006-2369 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2006-05-15 16:06:00 UTC |
| Updated | 2022-05-13 18:15:00 UTC |
| Description | RealVNC 4.1.1, and other products that use RealVNC such as AdderLink IP and Cisco CallManager, allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, as originally demonstrated using a long password. |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|
| Application |
Vnc |
Realvnc |
4.1.1 |
All |
All |
All |
| Application |
Vnc |
Realvnc |
4.1.1 |
All |
All |
All |
References
| Reference | Source | Link | Tags |
|---|
| Full Disclosure: some details regarding CVE-2022-24422 / iDRAC VNC authentication |
FULLDISC |
seclists.org |
|
| SecurityFocus |
BUGTRAQ |
www.securityfocus.com |
|
| 'Version 4.1.2' - MARC |
MLIST |
marc.info |
|
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH |
VUPEN |
www.vupen.com |
Vendor Advisory |
| AdderLink IP Unspecified VNC Vulnerability - Advisories - Secunia |
SECUNIA |
secunia.com |
Patch, Vendor Advisory |
| 25479 |
OSVDB |
www.osvdb.org |
|
| SecurityTracker.com Archives - RealVNC May Let Remote Users Connect Without Authenticating |
SECTRACK |
securitytracker.com |
Exploit, Patch |
| SecurityFocus |
BUGTRAQ |
www.securityfocus.com |
|
| IBM X-Force Exchange |
XF |
exchange.xforce.ibmcloud.com |
|
| Cisco - Networking, Cloud, and Cybersecurity Solutions |
CISCO |
www.cisco.com |
|
| SecurityFocus |
BUGTRAQ |
www.securityfocus.com |
|
| IntelliAdmin.com: VNC Flaw - Proof of concept |
MISC |
www.intelliadmin.com |
Exploit, Patch |
| SecurityFocus |
BUGTRAQ |
www.securityfocus.com |
|
| RealVNC Password Authentication Bypass Vulnerability - Advisories - Secunia |
SECUNIA |
secunia.com |
Patch, Vendor Advisory |
| IntelliAdmin.com: Security flaw in RealVNC 4.1.1 |
MISC |
www.intelliadmin.com |
|
| RealVNC Authentication Bypass - CXSecurity.com |
SREASON |
securityreason.com |
|
| SecurityFocus |
BUGTRAQ |
www.securityfocus.com |
|
| Webmail - OVH |
VUPEN |
www.vupen.com |
Vendor Advisory |
| '[Full-disclosure] RealVNC 4.1.1 Remote Compromise' - MARC |
FULLDISC |
marc.info |
|
| SecurityFocus |
BUGTRAQ |
www.securityfocus.com |
|
| SecurityFocus |
BUGTRAQ |
www.securityfocus.com |
|
| Cisco Products RealVNC Password Authentication Bypass - Advisories - Secunia |
SECUNIA |
secunia.com |
Vendor Advisory |
| RealVNC Remote Authentication Bypass Vulnerability |
BID |
www.securityfocus.com |
Exploit, Patch |
| US-CERT Vulnerability Note VU#117929 |
CERT-VN |
www.kb.cert.org |
Patch, Third Party Advisory, US Government Resource |
| RealVNC - VNC Free Edition 4.1 - release notes |
CONFIRM |
www.realvnc.com |
Patch |
| Webmail - OVH |
VUPEN |
www.vupen.com |
Vendor Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|
| Red Hat | 2006-08-16 | Mark J Cox | This issue only affected version 4.1.1 and not the versions distributed with Red Hat Enterprise Linux 2.1, 3, or 4. |
There are currently no legacy QID mappings associated with this CVE.