SunPCi II VNC uses a weak authentication scheme, which allows remote attackers to obtain the VNC password by sniffing the random byte challenge, which is used as the key for encrypted communications.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2002-08-31T04:00:00

Updated: 2002-09-10T09:00:00

Reserved: 2002-08-27T00:00:00


Link: CVE-2002-0994

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2002-10-04T04:00:00.000

Modified: 2008-09-05T20:29:29.707


Link: CVE-2002-0994

JSON object: View

cve-icon Redhat Information

No data.