Description
The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
Published: 2017-04-11
Score: 9.8 Critical
EPSS: 2.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1500-1 openssh security update
Debian DLA Debian DLA DLA-1500-2 openssh regression update
EUVD EUVD EUVD-2016-2999 The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
Ubuntu USN Ubuntu USN USN-2966-1 OpenSSH vulnerabilities
History

No history.

Subscriptions

Debian Debian Linux
Openbsd Openssh
Oracle Linux
Redhat Enterprise Linux Enterprise Linux Desktop Enterprise Linux Eus Enterprise Linux Server Enterprise Linux Server Aus Enterprise Linux Server Tus Enterprise Linux Workstation
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T23:10:40.244Z

Reserved: 2016-01-15T00:00:00.000Z

Link: CVE-2016-1908

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-04-11T18:59:00.167

Modified: 2025-04-20T01:37:25.860

Link: CVE-2016-1908

cve-icon Redhat

Severity : Moderate

Publid Date: 2016-01-14T00:00:00Z

Links: CVE-2016-1908 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses