Bugzilla – Bug 42250
VUL-0: CVE-2002-1336: vnc srandom() vulnerability (CAN-2002-1336)
Last modified: 2021-09-27 10:12:09 UTC
There is a vnc security fix available (nc-3.3.3r2-436), but there's a pending vulnerability not fixed: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1336 TightVNC before 1.2.6 generates the same challenge string for multiple connections, which allows remote attackers to bypass VNC authentication by sniffing the challenge and response of other users. Patch: diff -ur vnc_unixsrc-orig/libvncauth/vncauth.c vnc_unixsrc/libvncauth/vncauth.c --- vnc_unixsrc-orig/libvncauth/vncauth.c Thu Apr 29 07:39:15 1999 +++ vnc_unixsrc/libvncauth/vncauth.c Fri Apr 25 17:03:33 2003 @@ -124,9 +124,15 @@ vncRandomBytes(unsigned char *bytes) { int i; - unsigned int seed = (unsigned int) time(0); + unsigned int seed; + static int s_srandom_called = 0; + + if (!s_srandom_called) { + seed = (unsigned int)time(0) ^ (unsigned int)getpid(); + srandom(seed); + s_srandom_called = 1; + } - srandom(seed); for (i = 0; i < CHALLENGESIZE; i++) { bytes[i] = (unsigned char)(random() & 255); }
Hm, where did that come from? Anyway, it seems we have to do another update for it. Max, can you prepare new packages, please?
Just submitted the fixed package: ------------------------------------------------------------------- Thu Jun 5 16:38:25 CEST 2003 - max@suse.de - security fix: invalid use of srandom(). Bug 42250 ------------------------------------------------------------------- Who will write the patchinfo?
Did you also fix it for sles7? Ask me if you need help.
Please add also CAN-2002-1336 to the changelog.
Package for SLES7 and patchinfo file submitted.
Any prevision of when is it going to appear in the UL updates area?
Released on 2003-06-16.
CVE-2002-1336
CVE-2002-1336: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)