OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://openssh.com/security.html - | |
References | () http://secunia.com/advisories/31179 - Vendor Advisory | |
References | () http://www.openssh.com/txt/release-5.1 - | |
References | () http://www.securityfocus.com/bid/30339 - | |
References | () http://www.securitytracker.com/id?1020537 - | |
References | () http://www.vupen.com/english/advisories/2008/2148 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/43940 - |
Information
Published : 2008-07-22 16:41
Updated : 2024-11-21 00:48
NVD link : CVE-2008-3259
Mitre link : CVE-2008-3259
CVE.ORG link : CVE-2008-3259
JSON object : View
Products Affected
openbsd
- openssh
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor