Gentoo: tightvnc Insecure cookie generation
Summary
- --------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200302-15 - --------------------------------------------------------------------- FIXED VERSION : 1.2.8
- ---------------------------------------------------------------------
From Red Hat Security Advisory RHSA-2003:041-12:
"The VNC server acts as an X server, but the script for starting it generates an MIT X cookie (which is used for X authentication) without using a strong enough random number generator. This could allow an attacker to be able to more easily guess the authentication cookie."
Read the full advisory at: https://sso.redhat.com/auth/realms/redhat-external/protocol/saml
SOLUTION
It is recommended that all Gentoo Linux users who are running net-misc/tightvnc upgrade to tightvnc-1.2.8 as follows:
emerge sync emerge -u tightvnc emerge clean
...Read the Full Advisory