top of page

Nmap NSE Category vulns Script:realvnc-auth-bypass 檢查VNC伺服器是否易受RealVNC身份驗證繞過漏洞

  • 作家相片: Samuel
    Samuel
  • 2024年7月22日
  • 讀畢需時 1 分鐘

已更新:2024年8月6日


Nmap Script指令摘要


檢查 VNC 伺服器是否易受 RealVNC 身份驗證繞過漏洞(CVE-2006-2369)的影響。


另見:

vnc-brute.nse

vnc-title.nse


Nmap指令參數


vulns.short, vulns.showall

查看vulns庫的文檔。


Nmap Script指令範例


nmap -sV --script=realvnc-auth-bypass <target>

Nmap Script指令輸出

PORT     STATE SERVICE VERSION
5900/tcp open  vnc     VNC (protocol 3.8)
| realvnc-auth-bypass:
|   VULNERABLE:
|   RealVNC 4.1.0 - 4.1.1 Authentication Bypass
|     State: VULNERABLE
|     IDs:  CVE:CVE-2006-2369
|     Risk factor: High  CVSSv2: 7.5 (HIGH) (AV:N/AC:L/Au:N/C:P/I:P/A:P)
|       RealVNC 4.1.1, and other products that use RealVNC such as AdderLink IP and
|       Cisco CallManager, allows remote attackers to bypass authentication via a
|       request in which the client specifies an insecure security type such as
|       "Type 1 - None", which is accepted even if it is not offered by the server.
|     Disclosure date: 2006-05-08
|     References:
|       http://www.intelliadmin.com/index.php/2006/05/security-flaw-in-realvnc-411/
|_      https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2369

Nmap Script作者:

Brandon Enright

License: Same as Nmap--See https://nmap.org/book/man-legal.html


Nmap
Nmap

 

延伸閱讀

網路概論/有線網路測試/無線網路測試

©2023 Samuel-網路世界的攻略 版權所有。透過 Wix.com 製作的理想網站

bottom of page