CVE-2008-4770 (Moderate - only affects VNC Viewer) The vulnerability affects VNC 5.0.6 only, and is fixed in VNC 5.0.7. VNC 5.0.6 allows local users to execute arbitrary code as root, through passing a maliciously crafted argument vector to the vncserver (Mac) and vncserver-x11/ Xvnc (Linux, Solaris, AIX, HP-UX) setuid-root helpers. CVE-2013-6886 (No remote threat, local access required) This vulnerability is fixed in VNC Server 6.9. RealVNC VNC Server on Windows and VNC Viewer are not affected. This affects RealVNC VNC Server versions 5.0.6 – 6.8.0 and the issue has been fixed in VNC Server 6.9.0. RealVNC VNC Server has a time-of-check to time-of-use (TOCTOU) race condition vulnerability that allows local users to escalate user privileges on Linux and potentially macOS. Internally identified (No remote threat, local access required) This affects RealVNC VNC Server versions 5.1.0 - 6.9.0 on Windows and the issue is fixed in VNC Server 6.9.1. CVE-2022-27502 (No remote threat, local access required)Ī vulnerability was discovered in RealVNC VNC Server installations on Windows when running MSI repair, which can lead to a local user privilege escalation. This affects RealVNC VNC Server versions 5.1.0 - 6.10.1 and RealVNC VNC Viewer 5.1.0 - 6.22.515 on Windows and the issue is fixed in VNC Server 6.11 and VNC Viewer 6.22.826. CVE-2022-41975(No remote threat, local access required)Ī vulnerability was discovered in RealVNC VNC Server installations on Windows when running MSI repair, which can lead to a local user privilege escalation in certain specific circumstances. We recommend customers run the latest versions of VNC Viewer and VNC Server, available from, to maximise the security of their RealVNC deployment.īelow is a complete list of security issues which have affected RealVNC software. RealVNC takes pride in our security position and believes in full transparency regarding the security of our software.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |