VNC exploits, security hack caught in progress

Associate
Joined
18 Oct 2002
Posts
1,601
Location
Fab36 Dresden
Are there any known exploits for VNC, reason I ask is I just caught a remote connection that took control while I was browsing these forums. Noticed the System tray icon changed colour from white to dark blue, then saw the Start , Run dialog trying to launch this

Note: ( this is more than likely a malicious piece of code )

http://195.218.117.44/sp1.exe

That was the point I killed the VNC session, which is protected with a strong password.
 
Yep, confirmed VNC 4.1.x authentication security has been compromised by the easiest hack I have ever seen. Downloading latest updates right now!

Excerpt from http://www.securiteam.com/unixfocus/5WP0D1FIKC.html

Vulnerable Systems:
* RealVNC version 4.1.1

As documented in rfbproto.pdf by Tristan Richardson, the RFB (remote frame buffer) protocol performs an initial handshake which allows clients and servers to negotiate appropriate authentication measures. There are several methods of authentication, including the standard DES Challenge-Response, as well as an option to disable authentication completely. Due to an incorrect implementation, clients are able to force the server to disable authentication, and allow login without a password.

Proof of Concept:
1. Server sends its version, "RFB 003.008\n"
2. Client replies with its version, "RFB 003.008\n"
3. Server sends 1 byte which is equal to the number of security types offered
3a. Server sends an array of bytes which indicate security types offered
4. Client replies with 1 byte, chosen from the array in 3a, to select the security type
5. The handshake, if requested, is performed, followed by "0000" from the server

In RealVNC 4.1.1 and possibly prior versions which implement RFB 003.008 (though not RealVNC 4.0), the server does NOT perform a check to determine if the byte sent by the client in step 4 has actually been offered by the server in step 3a. In effect, authentication is moved from the server side to the client side. It is possible to force your client to simply request "Type 1 - None" as the security type, and gain access to the server without having to go through the time consuming and cumbersome password entry field.

Here is a typical packet dump:

Server -> Client: 52 46 42 20 30 30 33 2e 30 30 38 0a <- Server version
Client -> Server: 52 46 42 20 30 30 33 2e 30 30 38 0a <- Client version
Server -> Client: 01 02 <- One field follows... and that field is 02 (DES Challenge)
Client -> Server: 01 <- Ahh, the lovely 1 byte exploit! Beautiful, isn't it?
Server -> Client: 00 00 00 00 <-- Authenticated!
 
bitslice said:
have just notified the website.

.

The Url resource is now 404

Out of interest , when running this from the Run dialog, it launched from Firefox, my default. This would have blocked .exe by default behaviour. Although the remote hacker could easily click on the overide.
 
Back
Top Bottom