Vulnerability Name: | CVE-2013-6886 (CCN-90010) | ||||||||
Assigned: | 2013-12-19 | ||||||||
Published: | 2013-12-19 | ||||||||
Updated: | 2013-12-30 | ||||||||
Summary: | RealVNC VNC 5.0.6 on Mac OS X, Linux, and UNIX allows local users to gain privileges via a crafted argument to the (1) vncserver, (2) vncserver-x11, or (3) Xvnc helper. | ||||||||
CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C) 5.3 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
5.3 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-264 | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: MITRE Type: CNA CVE-2013-6886 Source: CCN Type: SA56278 RealVNC vncserver / vncserver-x11 / Xvnc Privilege Escalation Vulnerabilities Source: CCN Type: RealVNC Web Site 5.0.7, released 19th December 2013 Source: CONFIRM Type: UNKNOWN http://www.realvnc.com/products/vnc/documentation/5.0/release-notes/ Source: CCN Type: BID-64560 RealVNC VNC CVE-2013-6886 Multiple Local Privilege Escalation Vulnerabilities Source: XF Type: UNKNOWN realvnc-cve20136886-priv-esc(90010) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |