Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2006-2369

Description

RealVNC 4.1.1, and other products that use RealVNC such as AdderLink IP and Cisco CallManager, allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, as originally demonstrated using a long password.

POC

Reference

- http://seclists.org/fulldisclosure/2022/May/29

- http://securityreason.com/securityalert/8355

- http://www.cisco.com/warp/public/707/cisco-sr-20060622-cmm.shtml

- http://www.intelliadmin.com/blog/2006/05/vnc-flaw-proof-of-concept.html

Github

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/EsselKobby/Virtual_Infosec_Africa_LAB

- https://github.com/Farrhouq/Inpt-report

- https://github.com/Linathimqalo/cloud-honeypot-analysis

- https://github.com/RootUp/AutoSploit

- https://github.com/alanshlam/HoneyNet

- https://github.com/hackerhouse-opensource/exploits

- https://github.com/inspiretravel/Honeypot-tpot-in-AWS

- https://github.com/krishpranav/autosploit