指令類型:portrule
下載:https://svn.nmap.org/nmap/scripts/realvnc-auth-bypass.nse
指令摘要
檢查VNC伺服器是否易受RealVNC身份驗證繞過漏洞(CVE-2006-2369)的影響。
另見:
vnc-brute.nse
vnc-title.nse
指令參數
vulns.short, vulns.showall
查看vulns庫的文檔。
指令範例
nmap -sV --script=realvnc-auth-bypass <target>
指令輸出
PORT STATE SERVICE VERSION
5900/tcp open vnc VNC (protocol 3.8)
| realvnc-auth-bypass:
| VULNERABLE:
| RealVNC 4.1.0 - 4.1.1 Authentication Bypass
| State: VULNERABLE
| IDs: CVE:CVE-2006-2369
| Risk factor: High CVSSv2: 7.5 (HIGH) (AV:N/AC:L/Au:N/C:P/I:P/A:P)
| RealVNC 4.1.1, and other products that use RealVNC such as AdderLink IP and
| Cisco CallManager, allows remote attackers to bypass authentication via a
| request in which the client specifies an insecure security type such as
| "Type 1 - None", which is accepted even if it is not offered by the server.
| Disclosure date: 2006-05-08
| References:
| http://www.intelliadmin.com/index.php/2006/05/security-flaw-in-realvnc-411/
|_ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2369
作者:
Brandon Enright
License: Same as Nmap--See https://nmap.org/book/man-legal.html
隨選即看研討會
延伸閱讀
CyberScope Nmap 滲透測試手持式網路分析儀,整合了 Nmap 功能,為站點存取層提供全面的網路安全風險評估、分析、和報告——包括所有的端點和網路探索、有線與無線網路安全、漏洞評估 (Nmap) 以及網段和設定驗證;IT 人員透過單一工具以及單一介面,即可快速且即時的掌握企業或組織的各種混合式網路環境 (有線、無線、PoE)、各種連網終端裝置的拓樸、架構、設定、網段、效能、直到網路安全評估。