From aliz@gentoo.org Mon Feb 24 12:44:38 2003 From: Daniel Ahlberg To: full-disclosure@lists.netsys.com Date: Mon, 24 Feb 2003 12:35:16 +0100 Subject: [Full-Disclosure] GLSA: vnc (200302-16) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - --------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200302-16 - - --------------------------------------------------------------------- PACKAGE : vnc SUMMARY : insecure cookie generation DATE : 2003-02-24 11:35 UTC EXPLOIT : remote VERSIONS AFFECTED : <3.3.6-r1 FIXED VERSION : 3.3.6-r1 - - --------------------------------------------------------------------- - From Red Hat Security Advisory RHSA-2003:041-12: "The VNC server acts as an X server, but the script for starting it generates an MIT X cookie (which is used for X authentication) without using a strong enough random number generator. This could allow an attacker to be able to more easily guess the authentication cookie." Read the full advisory at: https://rhn.redhat.com/errata/RHSA-2003-041.html SOLUTION It is recommended that all Gentoo Linux users who are running net-misc/vnc upgrade to vnc-3.3.6-r1 as follows: emerge sync emerge -u vnc emerge clean - - --------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at http://cvs.gentoo.org/~aliz - - --------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQE+WgNxfT7nyhUpoZMRAjgdAKCkBB7XPF4iXhpPvHW9YQ0lTrTKIACeLKjx wcygjjWoyxpABWAfLk4BX1A= =HPqI -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html