Vigil@nce - RealVNC: privilege escalation via vncserver-x11 et Xvnc
January 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
A local attacker can use vncserver-x11 or Xvnc of RealVNC, in
order to escalate his privileges.
– Impacted products: RealVNC
– Severity: 2/4
– Creation date: 31/12/2013
DESCRIPTION OF THE VULNERABILITY
The RealVNC product installs the following programs as suid root:
- vncserver-x11 (User Mode)
- Xvnc (Virtual Mode)
However, an attacker can inject an additional parameter to these
programs.
A local attacker can therefore use vncserver-x11 or Xvnc of
RealVNC, in order to escalate his privileges.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/RealVNC-privilege-escalation-via-vncserver-x11-et-Xvnc-14005