CVE-2006-2450
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/07/2006
Last modified:
03/04/2025
Description
auth.c in LibVNCServer 0.7.1 allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, a different issue than CVE-2006-2369.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:libvncserver:libvncserver:0.7.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=376824
- http://libvncserver.cvs.sourceforge.net/libvncserver/libvncserver/libvncserver/auth.c?r1=1.11&r2=1.14&diff_format=u
- http://seclists.org/fulldisclosure/2022/May/29
- http://secunia.com/advisories/20940
- http://secunia.com/advisories/21179
- http://secunia.com/advisories/21349
- http://secunia.com/advisories/21393
- http://secunia.com/advisories/21405
- http://secunia.com/advisories/24525
- http://security.gentoo.org/glsa/glsa-200608-05.xml
- http://security.gentoo.org/glsa/glsa-200608-12.xml
- http://security.gentoo.org/glsa/glsa-200703-19.xml
- http://sourceforge.net/project/shownotes.php?release_id=431724&group_id=32584
- http://www.novell.com/linux/security/advisories/2006_42_kernel.html
- http://www.securityfocus.com/archive/1/442986/100/0/threaded
- http://www.securityfocus.com/bid/18977
- http://www.vupen.com/english/advisories/2006/2797
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=376824
- http://libvncserver.cvs.sourceforge.net/libvncserver/libvncserver/libvncserver/auth.c?r1=1.11&r2=1.14&diff_format=u
- http://seclists.org/fulldisclosure/2022/May/29
- http://secunia.com/advisories/20940
- http://secunia.com/advisories/21179
- http://secunia.com/advisories/21349
- http://secunia.com/advisories/21393
- http://secunia.com/advisories/21405
- http://secunia.com/advisories/24525
- http://security.gentoo.org/glsa/glsa-200608-05.xml
- http://security.gentoo.org/glsa/glsa-200608-12.xml
- http://security.gentoo.org/glsa/glsa-200703-19.xml
- http://sourceforge.net/project/shownotes.php?release_id=431724&group_id=32584
- http://www.novell.com/linux/security/advisories/2006_42_kernel.html
- http://www.securityfocus.com/archive/1/442986/100/0/threaded
- http://www.securityfocus.com/bid/18977
- http://www.vupen.com/english/advisories/2006/2797



