Gentoo Archives: gentoo-announce

From: Raphael Marichez <falco@g.o>
To: gentoo-announce@l.g.o
Cc: full-disclosure@××××××××××××××.uk, bugtraq@×××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [Full-disclosure] [ GLSA 200703-19 ] LTSP: Authentication bypass in included LibVNCServer code
Date: Mon, 19 Mar 2007 21:58:58
Message-Id: 20070318214941.GI12255@falco.falcal.net
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200703-19
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: LTSP: Authentication bypass in included LibVNCServer code
9 Date: March 18, 2007
10 Bugs: #142661
11 ID: 200703-19
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 LTSP includes a version of libVNCServer that is vulnerable to an
19 authentication bypass.
20
21 Background
22 ==========
23
24 The Linux Terminal Server Project adds thin-client support to Linux
25 servers.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 net-misc/ltsp < 4.2-r1 >= 4.2-r1
34
35 Description
36 ===========
37
38 The LTSP server includes vulnerable LibVNCServer code, which fails to
39 properly validate protocol types effectively letting users decide what
40 protocol to use, such as "Type 1 - None" (GLSA-200608-05). The LTSP VNC
41 server will accept this security type, even if it is not offered by the
42 server.
43
44 Impact
45 ======
46
47 An attacker could exploit this vulnerability to gain unauthorized
48 access with the privileges of the user running the VNC server.
49
50 Workaround
51 ==========
52
53 There is no known workaround at this time.
54
55 Resolution
56 ==========
57
58 All LTSP users should upgrade to the latest version:
59
60 # emerge --sync
61 # emerge --ask --oneshot --verbose ">=net-misc/ltsp-4.2-r1"
62
63 References
64 ==========
65
66 [ 1 ] CVE-2006-2450
67 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2450
68 [ 2 ] GLSA 200608-05
69 http://www.gentoo.org/security/en/glsa/glsa-200608-05.xml
70
71 Availability
72 ============
73
74 This GLSA and any updates to it are available for viewing at
75 the Gentoo Security Website:
76
77 http://security.gentoo.org/glsa/glsa-200703-19.xml
78
79 Concerns?
80 =========
81
82 Security is a primary focus of Gentoo Linux and ensuring the
83 confidentiality and security of our users machines is of utmost
84 importance to us. Any security concerns should be addressed to
85 security@g.o or alternatively, you may file a bug at
86 http://bugs.gentoo.org.
87
88 License
89 =======
90
91 Copyright 2007 Gentoo Foundation, Inc; referenced text
92 belongs to its owner(s).
93
94 The contents of this document are licensed under the
95 Creative Commons - Attribution / Share Alike license.
96
97 http://creativecommons.org/licenses/by-sa/2.5