ThinVNC 1.0b1 is vulnerable to arbitrary file read, which leads to a compromise of the VNC server. The vulnerability exists even when authentication is turned on during the deployment of the VNC server. The password for authentication is stored in cleartext in a file that can be read via a ../../ThinVnc.ini directory traversal attack vector.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T01:47:13.477Z
Reserved: 2019-10-16T00:00:00
Link: CVE-2019-17662
No data.
Status : Modified
Published: 2019-10-16T18:15:25.513
Modified: 2024-11-21T04:32:43.637
Link: CVE-2019-17662
No data.
OpenCVE Enrichment
No data.