Found 37 security holes in VNC on Linux, Windows
The researchers found a total of 37 security holes affecting four open source Virtual Network Computing (VNC) deployment solutions. Many of these have existed for more than 20 years, that is, from the late 20th century.
Specifically, the vulnerabilities were found in four VNC implementation solutions: LibVNC, TightVNC 1.X, TurboVNC and UltraVNC, by emergency security research team ICS CERT of Kaspersky. RealVNC - one of the extremely popular VNC solutions but not analyzed by unacceptable reverse engineering.
These VNC systems can be used on many famous operating systems, including but not limited to Windows, Linux, macOS, iOS and Android.
The deployment of VNC consists of two parts, the client and the server, allowing users to remotely access the system running the VNC server with the help of the VNC client using the RFB protocol to transmit "images." screen, data move mouse and press the "key.
More than 600,000 VNC servers are likely to be leaked
Kaspersky Lab's ICS CERT team found that more than 600,000 VNC servers can be accessed remotely via the Internet based on information collected by the Shodan search engine for Internet-connected devices - this estimate Excludes VNC servers running on local area networks.
The VNC security flaws that the team found were all due to inaccurate memory usage, with exploit attacks resulting in denial of service, glitches, as well as unauthorized access to people's information. use and execute malicious code on the target device. Many of these flaws have not been detected and fixed, even though they have existed for many years.
The full list of VNC vulnerabilities detected by the Kaspersky team is listed as follows:
LibVNC
- CVE-2018-6307
- CVE-2018-15126
- CVE-2018-15127
- CVE-2018-20019
- CVE-2018-20020
- CVE-2018-20021
- CVE-2018-20022
- CVE-2018-20023
- CVE-2018-20024
- CVE-2019-15681
TightVNC 1.X
- CVE-2019-8287
- CVE-2019-15678
- CVE-2019-15679
- CVE-2019-15680
TurboVNC
- CVE-2019-15683
UltraVNC
- CVE-2018-15361
- CVE-2019-8258
- CVE-2019-8259
- CVE-2019-8260
- CVE-2019-8261
- CVE-2019-8262
- CVE-2019-8263
- CVE-2019-8264
- CVE-2019-8265
- CVE-2019-8266
- CVE-2019-8267
- CVE-2019-8268
- CVE-2019-8269
- CVE-2019-8270
- CVE-2019-8271
- CVE-2019-8272
- CVE-2019-8273
- CVE-2019-8274
- CVE-2019-8275
- CVE-2019-8276
- CVE-2019-8277
- CVE-2019-8280
Kaspersky offers the following suggestions to prevent exploitation of these VNC security holes:
- Check if the device can connect remotely and block the connection remotely if not necessary.
- Inventory all remote access applications - not just VNC - and check to see if their versions are the latest. If you have doubts about the reliability of the application, please stop using. If you intend to continue deploying them, upgrade to the latest version.
- Protect your VNC server with a strong password. This will make the attack much harder.
- Do not connect to untrusted or untested VNC servers.
You should read it
- IBM embarked on FPT to distribute new network security solutions
- 4 best tips for server protection
- How to secure SSH server
- Information security test has the answer P3
- Microsoft added recovery, backup, security for Windows Server 2019
- Instructions for installing and configuring Microsoft Security Essentials
- Windows Server January Update causes Netlogon error
- The basic steps in dealing with network security issues that you need to understand
May be interested
- How to fix BlueKeep security error for Windows 2003, Windows XP, Windows 7, Windows Server 2008to fix the bluekeep security vulnerability, users need to disable rdp and block port 3389
- Internet Explorer has vulnerabilities, unused users are still hackedrecently, security researcher john page has discovered a new security vulnerability in this outdated web browser that allows hackers to steal user data.
- Detecting a new Linux vulnerability allows hackers to gain control of the VPN connectioninternational security researchers have found an entirely new linux vulnerability that allows potential attackers to hijack vpn connections on the device * nix and 'inject' the arbitrary data payload into it. tcp4 and ipv6 streams.
- Many major vulnerabilities found in Kaspersky Antivirus for Linux servers, download the patch hereleandro barragan and maximiliano vidal, two researchers from network security company core security, have found a number of vulnerabilities that can be exploited in the web management console of kaspersky anti-virus for linux servers.
- Microsoft is preparing to release a series of new security holesmicrosoft will release 12 new critical security patches to fix 57 security holes on all its software on tuesday (february 12). this will be the largest patch in the past few months.
- Google found 7 security bugs on the famous network software Dnsmasqsecurity researchers have found seven security holes on the dnsmasq network service software, three of which allow remote code execution and hijack computers.
- How to fix 'apt-get: command not found' error in Linux Terminalif you want to install software on a debian-based linux distribution, apt-get is a reliable terminal command. however, sometimes you may get stuck with 'command not found' error as response.
- Detecting a series of vulnerabilities can help hackers disable metal detectors at airportsresearchers have discovered a series of security vulnerabilities in a network component of garrett metal detectors.
- How to scan websites for potential security vulnerabilities with Vega on Kali Linuxresisting a hacker attack is one of the most important responsibilities a system administrator must perform. therefore, it is important for a system administrator to take proactive measures to find and fix vulnerabilities in their websites.
- Google blacklisted some web browsers on Linux, blocking access to Google servicesgoogle has issued a notice banning a number of popular linux browsers from signing in to its services.