Qemu kvm vnc password bypass security restriction Vulnerability
Release date:
Updated on:
Affected Systems:
QEMU
Description:
--------------------------------------------------------------------------------
Bugtraq id: 45743
QEMU is an open source simulator software.
Qemu kvm has a VNC Password Vulnerability. Remote attackers can exploit this vulnerability to bypass security restrictions to obtain sensitive information or perform unauthorized operations.
You can set or clear the VNC password when using the standard input/output monitor and VNC display. This also sets or disables VNC authentication. Set the VNC password to a null string to secretly disable all authentication.
<* Source: Petr Matousek
Link: http://www.qemu.com/qemu.git/commit? Id = 52c18be9e99dabe295321153fda7fce9f76647ac
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
QEMU
----
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://fabrice.bellard.free.fr/qemu/