91518 2003-02-24 19:44 /46 rader/ Daniel Ahlberg <aliz@gentoo.org> Importerad: 2003-02-24 19:44 av Brevbäraren Extern mottagare: bugtraq@securityfocus.com Mottagare: Bugtraq (import) <3640> Ärende: GLSA: tightvnc (200302-15) ------------------------------------------------------------ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - --------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200302-15 - - --------------------------------------------------------------------- PACKAGE : tightvnc SUMMARY : insecure cookie generation DATE : 2003-02-24 11:34 UTC EXPLOIT : remote VERSIONS AFFECTED : <1.2.8 FIXED VERSION : 1.2.8 - - --------------------------------------------------------------------- - From Red Hat Security Advisory RHSA-2003:041-12: "The VNC server acts as an X server, but the script for starting it generates an MIT X cookie (which is used for X authentication) without using a strong enough random number generator. This could allow an attacker to be able to more easily guess the authentication cookie." Read the full advisory at: https://rhn.redhat.com/errata/RHSA-2003-041.html SOLUTION It is recommended that all Gentoo Linux users who are running net-misc/tightvnc upgrade to tightvnc-1.2.8 as follows: emerge sync emerge -u tightvnc emerge clean - - --------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at http://cvs.gentoo.org/~aliz - - --------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQE+WgMufT7nyhUpoZMRAiKmAJ4qnkKGdjD3mizWhjUmWTcXrM0aqACeOp45 r+jWLJSEsOaSmhXb73IYMPc= =Rml2 -----END PGP SIGNATURE----- (91518) /Daniel Ahlberg <aliz@gentoo.org>/----------