CVE-1999-0526 Vulnerbility on W2k8 R2

Duane Fish duanedfish at yahoo.com
Thu Sep 18 13:35:31 PDT 2014


Alan,

I see nothing in the Add/Remove (or what was once called that), Programs, etc.  


Below is what the Vulnerability stated in the ticket I received.  Does this help?


===


Vulnerability Scan Results

Vulnerability Name: X Server Unauthenticated Access: Screenshot

Synopsis: The remote X server accepts TCP connections.

Description: The remote X server accepts remote TCP connections. It is possible for an attacker to grab a screenshot of the remote host.

Solution: Restrict access to this port by using the 'xhost' command. If the X client/server facility is not used, disable TCP connections to the X server entirely.

Vulnerability ID Details: Nessus Plugins


  
          
Nessus Plugins
Synopsis : The remote X server accepts TCP connections. Description : The remote X server accepts remote TCP connections. It is possible for an attacker to grab a screenshot of the remote host.   
View on www.tenable.com Preview by Yahoo  
  


________________________________
 From: Alan Coopersmith <alan.coopersmith at oracle.com>
To: Duane Fish <duanedfish at yahoo.com> 
Cc: "xorg at lists.x.org" <xorg at lists.x.org> 
Sent: Wednesday, September 17, 2014 11:19 PM
Subject: Re: CVE-1999-0526 Vulnerbility on W2k8 R2
 

On 09/17/14 08:45 PM, Duane Fish wrote:
> XII is what I was told.

I've never heard of "XII".  X11 is version 11 of the X protocol, not an
actual software program.

As noted on https://en.wikipedia.org/wiki/X_Window_System#Implementations
X servers for Microsoft Windows include Cygwin/X, Xming, Exceed, MKS X/Server,
Reflection X, and X-Win32.

Unless you can figure out the actual software being run, there's not much
we can do to help you.  It would be like being told you need to fix
your http program and not knowing if that's Internet Explorer, Firefox,
Chrome, Opera, Safari, or something else.

And if you can't find any signs of any of those programs, then it's most likely
a false alarm from your auditor or vulnerability scanner, when they can't figure
out what software is listening on port 6000, and just make up answers to look
useful when they're not.


-- 
    -Alan Coopersmith-              alan.coopersmith at oracle.com
     Oracle Solaris Engineering - http://blogs.oracle.com/alanc
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.x.org/archives/xorg/attachments/20140918/278db0de/attachment.html>


More information about the xorg mailing list