The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1500-1 openssh security update
Debian DLA Debian DLA DLA-1500-2 openssh regression update
EUVD EUVD EUVD-2016-2999 The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
Ubuntu USN Ubuntu USN USN-2966-1 OpenSSH vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T23:10:40.244Z

Reserved: 2016-01-15T00:00:00

Link: CVE-2016-1908

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-04-11T18:59:00.167

Modified: 2025-04-20T01:37:25.860

Link: CVE-2016-1908

cve-icon Redhat

Severity : Moderate

Publid Date: 2016-01-14T00:00:00Z

Links: CVE-2016-1908 - Bugzilla

cve-icon OpenCVE Enrichment

No data.