Handler on Duty: Guy Bruneau
Threat Level: green
Loading...
|
|
URL |
---|
Mailbag and DShield items generate a post VNC exploitation fun question |
Submitted By | Date |
---|---|
Comment | |
K. P. | 2009-10-04 18:45:22 |
RealVNC (http://www.realvnc.com) prior 12-May-2006 has "Password Authentication Bypass Vulnerability" (http://secunia.com/advisories/20107 , http://www.kb.cert.org/vuls/id/117929). | |
Andrew Daviel | 2006-06-11 19:53:09 |
Actively being exploited May/June 2006 http://www.securityfocus.com/bid/17978 etc. | |
Patrick K. | 2005-11-21 22:57:46 |
A VNC server listens on two ports. The exact port numbers depend on the VNC display number, because a single machine may run multiple servers. The most important one is 59xx, where xx is the display number. The VNC protocol itself runs over this port. So for most PC servers, the port will be 5900, because they use display 0 by default. (See also, port 5800.) |
CVE # | Description |
---|