vnc4 authentication bypass

Bug #77383 reported by David Bott
290
Affects Status Importance Assigned to Milestone
vnc4 (Debian)
Fix Released
Unknown
vnc4 (Ubuntu)
Fix Released
Critical
Unassigned
Dapper
Fix Released
Critical
Unassigned
Edgy
Fix Released
Critical
Unassigned

Bug Description

Binary package hint: vnc4server

Catalogued as Bug#395809: marked as done (vnc4 authentication bypass) in debian-bugs-rc

Apparently, this bug has been fixed in upstream versions of vnc4server (4.1.2), however the version in the Dapper repositories still contains the vulnerability.

dbott@thedrake:~$ sudo apt-cache show vnc4server
Package: vnc4server
Priority: optional
Section: universe/x11
Installed-Size: 2332
Maintainer: Ola Lundqvist <email address hidden>
Architecture: i386
Source: vnc4
Version: 4.1.1+xorg1.0.2-0ubuntu1
Provides: vnc-server, x0vnc-server

Essentially, it allows the password to be bypassed in VNC server
(see my write-up here: http://www.ubuntuforums.org/showthread.php?p=1942060#post1942060)

Links to references:

http://<email address hidden>/msg79912.html

Some more information about this issue can be found in:

http://www.intelliadmin.com/blog/2006/05/vnc-flaw-proof-of-concept.html
http://it.slashdot.org/article.pl?sid=06/05/11/2344217&from=rss
http://www.freerepublic.com/focus/f-news/1630902/posts
http://www.securityfocus.com/archive/1/433994/30/0/threaded

CVE References

Changed in vnc4:
importance: Undecided → Critical
Revision history for this message
towsonu2003 (towsonu2003) wrote :
Revision history for this message
Kees Cook (kees) wrote :

Thanks for this report! If anyone has time to package up a debdiff for Dapper and Edgy, I would be happy to review and publish the USN.

Changed in vnc4:
status: Unknown → Fix Released
Changed in vnc4:
importance: Undecided → Critical
importance: Undecided → Critical
Revision history for this message
William Grant (wgrant) wrote :

I've backported the appropriate patch from 4.1.2 to the versions in Dapper and Edgy (which happen to be the same).

Changed in vnc4:
status: Unconfirmed → In Progress
status: Unconfirmed → In Progress
Revision history for this message
William Grant (wgrant) wrote :
Revision history for this message
William Grant (wgrant) wrote :

I note that this vulnerability was released over 7 months ago now... It was reported (in bug 50913) a little over a month after it was discovered, and pitti posted a comment mentioning that a MOTU could take care of it if they wanted. Unfortunately, there's no proper universe security process, so nobody else really even saw the bug. I think this process needs to be rethought, so we don't have nasty flaws like this one around for such a long period of time.

Revision history for this message
Kees Cook (kees) wrote :

Hmm... an additional problem with vnc4 is that it doesn't build on edgy (or feisty), it seems. Were you able to build and test your debdiff on edgy? Perhaps the best approach would be to fix the build in feisty first, and then figure out what's needed to make it build edgy from there:

dpkg-checkbuilddeps: Unmet build dependencies: mesa-swrast-source (>> 6.4.1)

Revision history for this message
William Grant (wgrant) wrote :

mesa-swrast-source seems to have been replaced by mesa-swx11-source, so I've updated the Build-Depends. Also killing the build were a few bashisms in debian/rules. I've fixed them, and tested it (I made the mistake of thinking that if the changes worked in Dapper, they'd work in Edgy too; of course, I overlooked the fact that it had never built in Edgy, sorry). It works, and isn't vulnerable.

Revision history for this message
Kees Cook (kees) wrote :

Looks great! Go ahead and upload a version to feisty, since your fix should work there as well.

Changed in vnc4:
status: Unconfirmed → Fix Committed
status: In Progress → Fix Committed
status: In Progress → Fix Committed
Revision history for this message
William Grant (wgrant) wrote :

Fix uploaded to Feisty.

Changed in vnc4:
status: Fix Committed → Fix Released
Revision history for this message
William Grant (wgrant) wrote :

The sparc version FTBFSed on Edgy and Feisty, due to a removed header being included in the included Xorg. Here's a debdiff which should fix the issue.

Kees Cook (kees)
Changed in vnc4:
status: Fix Committed → Fix Released
Revision history for this message
Kees Cook (kees) wrote :

Great! Thanks for tracking down that sneaky bit.

Since the sparc FTBFS happened on the security buildd's, I needed to bump the version for the edgy-security debdiff. I'll upload that and get it building again. (I changed the edgy debdiff version to vnc4_4.1.1+xorg1.0.2-0ubuntu1.6.10.1)

I went ahead and published the Dapper updates.

Revision history for this message
Nicola Ferralis (feranick) wrote :

This update seemed to have break vnc4server in Edgy, see bug #78282. It was working with version:

vnc4 4.1.1+xorg1.0.2-0ubuntu1

Revision history for this message
William Grant (wgrant) wrote :

That is true, unfortunately. Not a use-case I tested, as I didn't expect an Edgy build to cause a /etc/X11/Xsession running with DISPLAY set to an Xvnc server to cause the process executing it to terminate, when running an xterm and the like on the Xvnc server ran fine. A rather odd problem, this is.

magilus (magilus)
Changed in vnc4:
status: Fix Committed → Fix Released
Revision history for this message
Peter Clifton (pcjc2) wrote :

Is this still a vunerability in Fiesty?

Shouldn't Fiesty merge to the upstream version 4.1.2 which doesn't have the problem? Its very confusing to tell if vunerable or not if fixes are backported, but the version number is still based at the known broken 4.1.1.

To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Duplicates of this bug

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.