Realvnc-auth-bypass NSE Script - Nmap

Download Reference Guide Book Docs Zenmap GUI In the Movies NSEDoc
  • NSEDoc Portal
  • NSE Documentation
  • Nmap API
  • NSE Tutorial
Scripts Libraries Categories
  • auth
  • broadcast
  • brute
  • default
  • discovery
  • dos
  • exploit
  • external
  • fuzzer
  • info
  • intrusive
  • malware
  • safe
  • version
  • vuln
Script Arguments Example Usage Script Output Script realvnc-auth-bypass

Script types: portrule Categories: auth, safe, vuln Download: https://svn.nmap.org/nmap/scripts/realvnc-auth-bypass.nse

Script Summary

Checks if a VNC server is vulnerable to the RealVNC authentication bypass (CVE-2006-2369).

See also:

  • vnc-brute.nse
  • vnc-title.nse

Script Arguments

vulns.short, vulns.showall

See the documentation for the vulns library.

Example Usage

nmap -sV --script=realvnc-auth-bypass <target>

Script Output

PORT STATE SERVICE VERSION 5900/tcp open vnc VNC (protocol 3.8) | realvnc-auth-bypass: | VULNERABLE: | RealVNC 4.1.0 - 4.1.1 Authentication Bypass | State: VULNERABLE | IDs: CVE:CVE-2006-2369 | Risk factor: High CVSSv2: 7.5 (HIGH) (AV:N/AC:L/Au:N/C:P/I:P/A:P) | RealVNC 4.1.1, and other products that use RealVNC such as AdderLink IP and | Cisco CallManager, allows remote attackers to bypass authentication via a | request in which the client specifies an insecure security type such as | "Type 1 - None", which is accepted even if it is not offered by the server. | Disclosure date: 2006-05-08 | References: | http://www.intelliadmin.com/index.php/2006/05/security-flaw-in-realvnc-411/ |_ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2369

Requires

  • nmap
  • shortport
  • vulns

Author:

  • Brandon Enright

License: Same as Nmap--See https://nmap.org/book/man-legal.html

Từ khóa » Vnc 4.0