Security Features

Affecting openssh package, versions <1:6.7p1-5+deb8u6

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.

References

CVSS Score

9.8
high severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    High
  • Availability
    High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE
CVE-2016-1908
CWE
CWE-254
Snyk ID
SNYK-DEBIAN8-OPENSSH-368951
Disclosed
11 Apr, 2017
Published
11 Apr, 2017