LOL -

This is one of the most fascinating things about Open Source software...

You should theoretically be able to compile your own and have the sources
available.  Have a problem? You don't need a binary - grab a few lines,
eyeball them, drop them in, and recompile...And if you can see it's going to
do something you can't have happen, you're welcome to modify the behavior...
 
----- Original Message -----
From: "Tim Waugh" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, 2002-03-12 05:04
Subject: Re: zlib vulnerability could affect VNC


: On Mon, Mar 11, 2002 at 09:46:44PM -0600, Mike Miller wrote:
:
: > Has anyone seen this?  I hope it doesn't open a security hole in VNC.
: > The article suggests that VNC is "potentially vulnerable."
: >
: > http://www.linuxsecurity.com/articles/security_sources_article-4582.html
:
: The reason is that many vendors were shipping VNC with zlib statically
: linked in (which is the default).  In fact, a malicious user must
: authenticate in order to be able to send compressed data.
:
: However, VNC's own authentication has been shown to be prone to a
: man-in-the-middle attack.
:
: (Disregarding the fact that once you have authenticated to a VNC
: server you can in general do things as the VNC server's user much more
: easily than that..)
:
: The other compelling reason to release VNC in this advisory was the
: fact that there is an exploitable denial-of-service problem in the
: mini-httpd that Xvnc provides.  Patch appended.
:
: Tim.
: */
(code snipped so no one accidentally tries to compile a bunch of lines
starting with ":")
---------------------------------------------------------------------
To unsubscribe, mail [EMAIL PROTECTED] with the line:
'unsubscribe vnc-list' in the message BODY
See also: http://www.uk.research.att.com/vnc/intouch.html
---------------------------------------------------------------------

Reply via email to