TROYANOSYVIRUS
Back to CVEs

CVE-2016-1908

CRITICAL
9.8

Description

The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.

CVE Details

CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published4/11/2017
Last Modified4/20/2025
Sourcenvd
Honeypot Sightings0

Affected Products

debian:debian_linuxopenbsd:opensshoracle:linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstation

Weaknesses (CWE)

CWE-287

References

http://openwall.com/lists/oss-security/2016/01/15/13(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-0465.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-0741.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.openssh.com/txt/release-7.2(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/84427(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1034705(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1298741(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201612-18(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.