AT&T WinVNC Remote Desktop Default Configuration Vulnerability

BID:1961

Info

AT&T WinVNC Remote Desktop Default Configuration Vulnerability

Bugtraq ID: 1961
Class: Configuration Error
CVE:
Remote: Yes
Local: Yes
Published: Nov 19 2000 12:00AM
Updated: Nov 19 2000 12:00AM
Credit: This vulnerability was first reported to Bugtraq by Gossi <[email protected]> on November 19, 2000.
Vulnerable: AT&T WinVNC 3.3 x
+ Microsoft Windows 2000 Professional
+ Microsoft Windows 95
+ Microsoft Windows 98
+ Microsoft Windows ME
+ Microsoft Windows NT 4.0
+ Microsoft Windows NT 3.5
Not Vulnerable:

Discussion

AT&T WinVNC Remote Desktop Default Configuration Vulnerability

AT&T WinVNC (Virtual Network Computing) is a freeware package available from AT&T Labs Cambridge that allows an existing desktop of a PC to be remotely available.

During WinVNC's default install process, a registry key is created that could allow a remote attacker to modify the registry entry and allow un-authenticated access to the service. The registry key - HKEY_LOCAL_MACHINE\Software\ORL\WinVNC3\ - contains the connection password, IP and query restrictions as well as other settings. By default, this key is created during install with "Administrator" and "SYSTEM" accounts having full control and the "Everybody" account having Special Access (read and modify). Please note that under Windows 2000, this key has "Standard User" privileges which can accomplish the same thing.

While it is possible for a remote attacker to exploit this using regedit (blank the password value and set the "AuthRequired" key to 0) the machine needs to be a NT 4.0 system missing the registry permission patch. If the machine is patched or is Windows 2000, you must have administrator rights or equivalent to gain access from the network. If successful, a remote attacker could gain complete access to the system.

Exploit / POC

AT&T WinVNC Remote Desktop Default Configuration Vulnerability

Please see discussion.

Solution / Fix

AT&T WinVNC Remote Desktop Default Configuration Vulnerability

Solution:
Administrators should use Regedit to remove the "Everybody" and "Standard Users" permissions from the registry key entry.

To aid in the prevention of a remote comprimise (NT 4.0), ensure that the Registry Permission patch has been applied and restrict access to the registry.

References

AT&T WinVNC Remote Desktop Default Configuration Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report