We actively support and provide security updates for the following versions:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
We take security seriously. If you discover a security vulnerability in rustvncserver, please report it responsibly.
Please DO NOT create a public GitHub issue for security vulnerabilities.
Instead, please report security issues via email to:
dustin.mcafee@my.maryvillecollege.edu
Please include the following information in your report:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Suggested fix (if you have one)
- Your contact information
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Varies by severity (critical issues prioritized)
- We will acknowledge your report within 48 hours
- We will provide regular updates on our progress
- We will notify you when the vulnerability is fixed
- We will publicly disclose the vulnerability after a fix is released
- We will credit you in the security advisory (unless you prefer to remain anonymous)
When using rustvncserver in production:
- Use Strong Passwords: Always set a strong VNC password
- Use Encryption: Consider using VNC over SSH tunnel or VPN
- Network Security: Restrict VNC port access with firewall rules
- Keep Updated: Always use the latest version with security patches
- Monitor Logs: Watch for suspicious connection attempts
- Limited Access: Only allow connections from trusted IP addresses
- VNC Authentication: The standard VNC authentication (DES-based) is not cryptographically strong by modern standards. For sensitive environments, always use VNC over an encrypted tunnel (SSH, VPN, TLS).
- No Encryption: The RFB protocol itself does not provide encryption. All data, including the framebuffer, is sent in plaintext after authentication.
- Brute Force: VNC authentication is vulnerable to brute-force attacks. Use strong passwords and consider rate limiting at the network level.
For production environments, we recommend:
# Example: VNC over SSH tunnel
ssh -L 5900:localhost:5900 user@vnc-server
# Then connect to localhost:5900 from your VNC clientSecurity fixes will be released as:
- Patch releases for supported versions (1.x.y → 1.x.z)
- Announced in CHANGELOG.md
- Tagged as security releases in GitHub
Subscribe to repository releases to be notified of security updates.
We recognize and thank security researchers who responsibly disclose vulnerabilities:
(No reports yet - be the first!)
Thank you for helping keep rustvncserver and its users safe!