[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2016-1908Date: (C)2017-04-12   (M)2024-02-22


The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 9.8CVSS Score : 7.5
Exploit Score: 3.9Exploit Score: 10.0
Impact Score: 5.9Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: HIGHAvailability: PARTIAL
Integrity: HIGH 
Availability: HIGH 
  
Reference:
SECTRACK-1034705
BID-84427
GLSA-201612-18
RHSA-2016:0465
RHSA-2016:0741
https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html
http://openwall.com/lists/oss-security/2016/01/15/13
http://www.openssh.com/txt/release-7.2
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
https://anongit.mindrot.org/openssh.git/commit/?id=ed4ce82dbfa8a3a3c8ea6fa0db113c71e234416c
https://bugzilla.redhat.com/show_bug.cgi?id=1298741
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf

CWE    1
CWE-287
OVAL    14
oval:org.secpod.oval:def:40349
oval:org.secpod.oval:def:110141
oval:org.secpod.oval:def:703098
oval:org.secpod.oval:def:1501406
...

© SecPod Technologies