Critical Flaw Found in VNC 4.1 175
jblobz writes "IntelliAdmin has discovered a critical flaw that allows an attacker to control any machine running VNC 4.1. The flaw grants access without the attacker obtaining a password. The details of the vulnerability have not been released, but their website has a proof of concept that allows you to test your own VNC installation for the vulnerability"
SSH (Score:5, Insightful)
Re:SSH (Score:2, Informative)
Re:SSH (Score:2)
I mean, giving advice like that is fine, but unless you give us more information on how to set it up, you're basically just saying, "I'm so 1337 I know how to do this, and if you don't know how to do this you're not 1337 enough, newb!"
Also, does anybody know if OSXVNC is vulnerable to this f
Re:SSH (Score:2)
http://www.ssh.com/support/documentation/online/ss h/adminguide/32/Port_Forwarding.html [ssh.com]
There is a myriad of guides on how to do this. The setup doesn't come from within your VNC apps, but from ssh.
Set up your ssh server and clients. Use public key cryptography instead of a password. Run your VNC server and make sure it is accessable from the machine that is running your ssh server. It can be the same machine, but it doesn't have to be. Don't fo
Re:SSH (Score:2)
Anyway, your Linux instructions might work on my OS X box, but I don't see anything in there about Windows XP.
Re:SSH (Score:2)
From your online resume: "Serving as primary programmer for a multi-player online role-playing game. Duties include maintaining and expanding a large open-source C++ server program, designing and implementing innovative new gameplay features, resolving player disputes, SQLite database administration, and Linux server administration."
But his explanation on ssh tunneling is gibberish?
A word of warning: the resume you intentionally put up on the net with Google is not the only info abou
Re:SSH (Score:2)
Whether you consider it rude or not, as far as I'm concerned, everything he typed was technobabble I don't understand whatsoever, and I'm just letting him know that. Plus, witho
Re:SSH (Score:2)
I'm not sure the vnc guys are even woried about runing thru an ssh forward. It doesn't even seem to be on thier radar as far as features go. I personaly just woulnd run VNC from outside the network unless i tunneled into it in the first place. Maybe they asumed everyone was that concious, i dunno.
I'm not a newb when it comes to computers. I do how
Re:SSH (Score:2)
And all that stuff about SFTP only being secure if it's "configured correctly"... why is that my problem? The makers of Cyberduck (my FTP client) are the ones doing the configuring... that's the entire point of software, to reduce complexity. If I wanted to waste all my time learning
Re:SSH (Score:2)
VNC isn't the only option. There is apple remote desktop and a few other. But as i stated before, you need to do a little learning. Instead your stuck complaining about a program because it isn't point and click the way you want it. You next comment demonstrates exactly why you are dis
Re:SSH (Score:2)
Re:SSH (Score:2)
Mac OS X comes with OpenSSH and only needs to have sshd enabled. On your Windows box, you can use Cygwin to install OpenSSH. If you only need an SSH client (no server) on the Windows box, PuTTY will work.
Re:SSH (Score:3, Informative)
Re:SSH (Score:2, Insightful)
The parent was saying that the problem was not with the lack of encryption, it was a problem with the authentication. He's not saying that SSH wouldn't solve the problem, simply that the problem would not be solved by SSH's encryption like the original poster implied, but its extra layer of authentication which is not affected by this vulnerability.
SSH Port forwarding (Score:5, Informative)
Unless I am very much mistaken SSH would be a valid work around for the problem and it has nothing o do with SSH encryption although it makes VNC use safer, it has to do with SSH tunneling. Even if the computer you are connecting to with VNC only has port 22 exposed to the internet you can still connect to the VNC server on one of the usual ports in the 59xx range. Before you can do that, however, you first have to use SSH port forwarding by to create an SSH tunnel and physically log onto the target system with the 'ssh' command using the '-L' option. That basically means that you can only get at the VNC server by creating an SSH tunnel first. This makes any authentication vulnerability of the VNC server a non issue, not that a for this bug ASAP would be a bad thing. You should always force users to use SSH when connecting via VNC and not just rely on VNC's native authentication all on it's own.
Re:SSH Port forwarding (Score:3, Informative)
Re:SSH Port forwarding (Score:2, Informative)
Re:SSH Port forwarding (Score:2)
It authenticates only the first 8 letters of your password and uses a pretty weak DES challenge algorithm. After that, everything else is in the clear.
Re:SSH Port forwarding (Score:2)
I use VNC over ssh all the time. Anything I do is connected over ssh, except samba which is blocked by my two broadband router/firewalls. Matter of fact, vnc is also allowed out of my linux box, but blocked by the firewalls. Makes easier to connect from downstairs to upstairs, but not by much honestly.
Re:SSH Port forwarding (Score:2)
In other words, this can make for a much bigger target for hackers
Re:SSH Port forwarding (Score:2, Insightful)
Re:SSH Port forwarding (Score:2)
Re:SSH (Score:2, Informative)
Tunneling a protocol over SSH does not eliminate the need to authenticate on that protocol! The very nature of tunneling means whatever protocol is carried down the tunnel is unmodified
Tunneling VNC over SSH simply means you establish a secure shell connection and do port forwarding between your target host and your client. Your client forwards connections to the localhost on a speci
Re:SSH (Score:2)
It's not more secure at all. By allowing new services to listen on publicly accessible ports it is impossible to be more secure. You can only increase security by taking away services. By definition, adding more is adding vunerabilites.
If SSH is your first line and you use tunnels to get at everything else, no one can access
Not enough details (Score:2, Insightful)
Re:Not enough details (Score:3, Informative)
Re:Not enough details (Score:3, Insightful)
This is wrong. A system that only accepts connections via the loopback interface is only subject to privilege escalation attacks. This is a far cry from a remote compromise. In a system with untrusted users this is still a big deal but it is far less problematic than remote compromise.
Yikes! (Score:5, Insightful)
Re:Yikes! (Score:2, Interesting)
This guys will be responsible for a few server's hacking.
Re: (Score:2)
Re:Yikes! (Score:2)
Re:Yikes! (Score:5, Informative)
Yes, indeed. However this isn't a release of an exploit, it is somebody saying "bring your machine, and I'll exploit it for you."
What this means, effectively, is that anyone who is prepared to go to the effort of sniffing packets can easily figure out what's going on, but the rest of us are still in the dark. I can't use this to test the machines on my internal network because there's no way I'm going to open the VNC ports on my firewall. He may be wrong when he says on the previous article that (e.g.) TightVNC isn't vulnerable, it may be vulnerable to a slight variation of the attack that could easy be found by somebody who knew how it worked, but because he's released no details to anyone who doesn't make a large effort to understand the problem we can't know that. But be sure that there are some blackhats out there who have already tested this and understand why it works who have tried to figure out if they can make it work on another version.
This behaviour is wrong in every way possible. Disclosure should be complete or not exist at all, IMO. Anything between is dangerous.
Re:Yikes! (Score:2)
Totally agree with you. Disclosure is a necessary FORMAL process. It involves complete academic review. Those that do it can right can find gainful employment as security professionals.
Re:Yikes! (Score:2)
tight vnc (Score:3, Interesting)
that is what I use
Re:tight vnc (NOTE TO MODERATORS) (Score:3, Informative)
Note to self: proofread post before posting.
SSH tunnels (Score:5, Insightful)
And here's how you do it .... (Score:5, Informative)
Add the following to your ~/.ssh/config:
Then ssh into the machine to create the tunnel. You then connect to the remote VNC session with "xvncviewer localhost:1".
Re:And here's how you do it .... (Score:2)
They would if you were running OpenSSH from Cygwin [cygwin.com], wouldn't they?
Capture the packets (Score:5, Informative)
scope of bug... (Score:5, Informative)
Re:scope of bug... (Score:2, Informative)
It's all the same.
Thank you. (Score:2)
Re:scope of bug... (Score:4, Interesting)
I wouldn't assume they aren't affected by this. They very likely aren't, but it looks like this guy stumbled upon the flaw as he was implementing an independent VNC viewer from the VNC specification. It doesn't sound like he really has his mind around why RealVNC is affected, so it'd be prudent to assume that they are. (i.e. Once he understands why the attack works he may be able to produce one easily against TightVNC and UltraVNC.)
At any rate, if you operate your VNC service in a reasonable configuration, you're safe. By "reasonable configuration" I mean listening only on 127.0.0.1 so that people have to connect via ssh or client-authenticated stunnel to get to it. VNC authentication is not safe on an untrusted connection. And you shouldn't trust your connection unless your network is so small and has such well-controlled access that you can physically inspect every device on it in <30 minutes with absolute certainty that you haven't missed any.
Re:scope of bug... (Score:4, Informative)
Re:scope of bug... (Score:2)
Given that the flaw finder does not understand why his stream of b
Re:scope of bug... (Score:5, Interesting)
We used the original VNC for quite a while then switched to TightVNC. It seemed "better", but on the Windows platform there were some situations where it had difficulty finding the need to redraw certain screen areas.
(I am of course assuming that the 'poll full screen' option is not used, but limited areas of the screen are polled)
Sometimes a click on a window bar is needed to refresh that window, sometimes it is enough to move the mouse around a little.
The ancient version did allow you to refresh the screen by "painting" the area with the mouse cursor, but TightVNC usually refreshes an entire updated area when it is moved over by the mouse.
However, as there still were apps which did not work entirely satisfactorily (especially when extensive use was made of tooltips), we kept looking and it seemed that UltraVNC was promising. It was installed on a few systems and it worked ok, then rolled out to a lot of systems.
Now, problems again appear, but in other situations.
Sometimes it delays refreshing a bit long, and shortening the timer increases the CPU usage too much.
Using the special video driver improves things a little, but it has proven difficult to find a really well-working setup that does not have annoying lag and does not overload the system either.
One one system it was even replaced by RealVNC because of system load issues.
Fortunately all those servers and clients inter-operate, or else there would be a big mess by now.
(also, we fortunately can automatically and silently install new or other versions on at least the client systems, so switching is not too hard)
I wonder what other people's experiences are. I don't define "better" as "having more toolbar buttons" or "having more added options like file transfer", but I am still looking for a better VNC in terms of good interactive performance without overloading the server system.
Re:scope of bug... (Score:2)
So I'm also interested to hear about alternatives...
Re:scope of bug... (Score:2)
-R
Re:scope of bug... (Score:2)
My experience is that the "poll full screen (ultrafast)" mode can use a lot of cpu in certain cases. Not always. I have not really identified the exact problem.
So we usually do not enable this. Then it works satisfactorily in other versions, but in UltraVNC there often is a quite long lang before updates are shown when there is no user action.
I need to spend some time to really debug this, because "it is slow" comments from users are often difficult to interpret. Sometimes it is slo
Re:scope of bug... (Score:2)
During workstation installs, we install it as a service but then later set that service to "Manual". You can then remotely start the service after the system has booted (via Manage and Connect remote computer) and take over the login screen.
TightVNC has a bug here: it disconnects when you login. But it remains active so you can connect again and see the logged-in desktop.
Other versions remain connected through the login processing.
Re:scope of bug... (Score:2)
I switched from utralvnc viewer to realvnc viewer because it was much faster on a low end machine. So it might be crap for you, it works for me.
Re:scope of bug... (Score:2)
Well, RealVNC comes with a XFree/XOrg driver (vnc.so) that gives a very natural way to share the "native" X session. This is extremely useful when you want to have the normal X session on your machine (running at a normal speed), but still want to preserve the ability to connect to it remotely via VNC. AFAIK TightVNC does not allow anything like that and Ultr
encrypted wireless? (Score:2)
Re:encrypted wireless? (Score:2, Informative)
Re:encrypted wireless? (Score:2)
I mean, will the duplicate MAC mean that just everyting refuses to work (limiting the damage to a DOS) or is it possible to connect two stations with the same MAC and still have useful two-way communication?
Re:encrypted wireless? (Score:2)
In fact, it is security-wise much more important that
Re:encrypted wireless? (Score:2)
My original question was: would MAC address filtering on a point-to-point link that is ON all the time prevent anyone to connect because the duplicate MAC would cause trouble. You said yes, I think so.
I see this as similar to having two boxes with the same address on a wired LAN. Sure someone can change his MAC and IP address and be an imposter on a (supposedly non-switched) LAN, but he will not be accomplishing too much as all TCP connects he is trying to ma
Point taken, and very true, but please... (Score:2)
And you want us to sit around and listen to a fucking podcast? Jesus christ, do you think we have nothing better to do? A quick HowTo or Wiki is just fine, thank you.
But yeah, MAC address filtering has no purpose other than to frustrate you when you use a new network adapter.
Re:encrypted wireless? (Score:2)
I congratulate you with your belief in WPA and AES. But I expect that you considered WEP the same way before it turned out to be not so secure.
And you completely disregard the fact that even a strong protocol can be weakened by its implementation. The firmware in the access point might have a bug that enables outsiders to circum
Re:encrypted wireless? (Score:2)
Not neccessarilly. WEP isn't all that bad if you update your firmware and change keys periodically. The updated firmwares avoid the weak keys that lead to the vunerability.
MAC filtering is pointless with encyption. Faking a MAC is childs play, all you'd need to do is break the encryption and sniff for a MAC address that was allowed. MAC filtering is only useful when you don't want encryption at all but still want some kind of rudamentary access control. Easilly br
Specific to RealVNC 4.1. TightVNC and UltarVNC OK (Score:2, Informative)
Bottom Line (Score:5, Informative)
"So it looks like a flaw is in the current RealVNC 4.1.1 authentication process. I am not going to give any clues as to what it is until I can figure it out totally, and promptly let the RealVNC team know so they can resolve the issue."
So there you go. This is apparantly not a system-wide VNC issue and is a RealVNC 4.1.1 issue only. Submitter you suck.
Re:Bottom Line (Score:2)
OMFG!! (Score:2, Funny)
(yeah - I know..it's a joke)
Re:OMFG!! (Score:2)
It's called T.V.
FC 4 vnc-server-4.1.1-10.1 tested and passed (Score:3, Interesting)
I even disabled password for the account VNC display is binded to and set to no encryption for VNC.
Nothing happened. No display, nah da, nothing.
I have stable FC4 vnc package version 4.1.1-10.1.
Re:FC 4 vnc-server-4.1.1-10.1 tested and passed (Score:3, Interesting)
> (why need vnc when you have ssh.. who knows..*sigh*)
Um, because you can't use ssh to connect to an existing/running collection of Xserver and Xclients. Sigh.
Inotherwords, you can't use ssh to connect to your Mom's machine in a different city and help figure out why she has trouble using/interacting with Kmail or some other GUI program. But with vncserver + vncviewer, you CAN.
It is annoying, because what would be 1,000 times better for *ix->*ix would b
Re:FC 4 vnc-server-4.1.1-10.1 tested and passed (Score:5, Informative)
Re:FC 4 vnc-server-4.1.1-10.1 tested and passed (Score:2)
>you to connect to a running X session and view it using VNC
Yep- I already use X11vnc, even at work. It is extremely useful. But VNC can't touch the native X protocol in speed or accuracy.
Re:FC 4 vnc-server-4.1.1-10.1 tested and passed (Score:2)
I can see why you posted anonymously.
What do you suggest people use, oh polite and insightful one? "*ix" is a hell of a lot easier to type than "Unix, Linux, BSD, and other Unix-like/clone operating systems" and generally, everyone knows exactly what you mean.
Re:FC 4 vnc-server-4.1.1-10.1 tested and passed (Score:2)
Re:FC 4 vnc-server-4.1.1-10.1 tested and passed (Score:2, Informative)
Using a VNC desktop and squashing the color depth down gives a huge speed up.
It can also help when you're moving from meeting to meeting. I leave a VNC session running with a few apps, and I can connect to it from various physical locations, even if my IP changes or I have to turn off my laptop. Try that with X forwarding.
Re:FC 4 vnc-server-4.1.1-10.1 tested and passed (Score:2, Informative)
Re:FC 4 vnc-server-4.1.1-10.1 tested and passed (Score:2)
> linux box and use a VNC client on the box itself then leave the session
> open and connect to it from a windows box. Ok, via Cygwin you can pull off
> X, but, it is definitely not worth all that extra clutter when a simple VNC
> client can achieve the same purpose and is designed to do it better (remote
> X is really intended for a lan dumb client type setup whereas VNC can be
> used to add JPEG compression, decrease c
Re:FC 4 vnc-server-4.1.1-10.1 tested and passed (Score:2)
And as the other poster said, VNC can be faster in many situations.
Re:FC 4 vnc-server-4.1.1-10.1 tested and passed (Score:2)
Re:FC 4 vnc-server-4.1.1-10.1 tested and passed (Score:2)
"we"? oh boy... Gollum, is that you?
Company sells remote control software (Score:3, Insightful)
Re:Company sells remote control software (Score:2)
I would be as well, but the software is under the GPL, so I don't think they're going to be trying to throw any backdoors in there without some serious obfuscation.
OS X Affected? (Score:3, Insightful)
Re:OS X Affected? (Score:5, Funny)
Re:OS X Affected? (Score:2, Funny)
Re:OS X Affected? (Score:2)
I'm assuming that since this bug is specific to RealVNC 4.1.1, OS X VNC servers like OSXVnc aren't either.
VNC is an important tool (Score:2)
Re:VNC is an important tool (Score:3, Insightful)
Heres a reason (Score:2)
I like VNC BECAUSE it's simple, effective, and ridiculously easy to setup. Makes troubleshooting remotely very easy. But I run it over tunnels, not in the open. Additionally, you can use a java client to connect so it makes the native OS less important.
Re:Heres a reason (Score:2)
If you're on a non-Windows machine, I find rdesktop incredibly fast to connect to a Windows machine. Far better than vnc or even remote desktop from windows->w
Re:VNC is an important tool (Score:2)
There are couple of reasons we use VNC. One is we're dealing with a lot of OSes. I'm not sure if one can remote control a W2K box from a Solaris box. VNC is something widely available on all platforms. Second, which gives a reason more preferable to tunnel X is that, one can pop open all the required terminals/applications running on a VNC session, and when working with others, just ask them to pop ano
Built-in VNC server in Mac OS X vunerable? (Score:3, Interesting)
There's no real good way to set up that service with an SSH tunnel -- I think it's intended use is only on local networks when you're behind a firewall, but on the other hand there's nothing that marks it as being screamingly insecure when you go to turn it on, either (IIRC). If you want to tunnel it, or rather, if you want to limit access to connections that are coming in via an SSH tunnel, I think you have to run a regular VNC server and set it up manually.
The test page is down right now so I can't check it one way or the other, but I'd be interested to see if anyone knows what code is actually used for Apple's built-in VNC server, and whether people believe it's vunerable.
Re:Built-in VNC server in Mac OS X vunerable? (Score:2, Informative)
This vulnerability is with the Windows-based RealVNC server and its protocol implementation only, and not with the protocol itself.
RealVNC (Score:2)
Why? For other VNC implementations, people have to use ssh tunneling (no built-in encryption), but RealVNC is supposed to offer secure end-to-end encryption without ssh tunneling. If that doesn't work or if the RealVNC developers can't be trusted not to screw up, the whole raison d'etre for RealVNC goes away. And, in fact, RealVNC is built into devices (e.
Ouch! However... (Score:3, Informative)
Also, there have been vulnerabilities before.
This, of course, is not good, but whether it is acceptable also depends on the purpose that you're using it for.
I installed VNC on the computers at my parents place, but it's disabled by default (but put in an obvious place in the start menu). When there is a problem, my parents can call me, I'll tell them to start the "Remote control thingy" (1 click in the start menu) and then I can reach the computer.
Not much can go wrong that way, of course someone could intercept the traffic etc. if they like to stare at default windows desktops I wish them good luck.
However, don't type the admin password over VNC, I'd guess...it's like doing 'su root' over telnet....
Re:Ouch! However... (Score:3, Informative)
UltraVNC incorporates custom extensions that implement a Microsoft encryption DLL on Windows machines (also works flawlessly through Wine). Coupled with UltraVNC SC, you can create a single executable that anyone can download from your website and run and it will connect, fully encrypted, back through whatever firewall they have to your machine which (if it is running a suitable client) will take it over as normal.
Or y
Alarmist (Score:3, Informative)
RealVNC has always tried to market up their version, and has been the fastest to add new features; two common warning signs when looking at a software's level of security.
one workaround (Score:3, Funny)
RealVNC 4.1.2 released (Score:2)
Nice :) (Score:2)
Edit the title (Score:2)
Re:RealVNC (Score:2, Informative)
Answering my own question, from this link [intelliadmin.com]: