Required CVE Record Information
Description
In mprivacy-tools before 2.0.406g in m-privacy TightGate-Pro Server, broken Access Control on X11 server sockets allows authenticated attackers (with access to a VNC session) to access the X11 desktops of other users by specifying their DISPLAY ID. This allows complete control of their desktop, including the ability to inject keystrokes and perform a keylogging attack.
References 5 Total
- https://sec-consult.com/en/vulnerability-lab/advisories/index.html
- https://www.m-privacy.de/en/tightgate-pro-safe-surfing/
- https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-m-privacy-tightgate-pro/
- seclists.org: 20231127 SEC Consult SA-20231122 :: Multiple Vulnerabilities in m-privacy TightGate-Pro mailing-list
- http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 5 Total
- https://sec-consult.com/en/vulnerability-lab/advisories/index.html x_transferred
- https://www.m-privacy.de/en/tightgate-pro-safe-surfing/ x_transferred
- https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-m-privacy-tightgate-pro/ x_transferred
- seclists.org: 20231127 SEC Consult SA-20231122 :: Multiple Vulnerabilities in m-privacy TightGate-Pro mailing-listx_transferred
- http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html x_transferred