Lucene search

K
certCERTVU:118892
HistoryJan 18, 2001 - 12:00 a.m.

Older SSH clients do not allow users to disable X11 forwarding

2001-01-1800:00:00
www.kb.cert.org
4

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

78.4%

Overview

This vulnerability may allow an attacker to make unauthorized connections to affected client machines.

Description

Older versions of the SSH client do not allow the user to disable X11 forwarding. As a result, if the client connects to a malicious server, the server can open an X11 connection to the client’s display without notifying the client. The attacker would then have access to the client’s X11 session, which would permit activities such as keystroke monitoring.

It is also possible for an attacker to make X11 connections to the client by taking over the victim’s TCP connection; however, this should generate a client-side warning about changed host keys. If the client responds to the prompt by breaking the connection, no keystrokes or sensitive data will be transmitted.


Impact

Attackers can make unauthorized connections to victim machines, potentially accessing sensitive data.


Solution

Upgrade to a version of SSH that allows X11 forwarding to be disabled.


Vendor Information

118892

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

SSH Communications Security Affected

Updated: November 03, 2000

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23118892 Feedback>).

OpenSSH __ Not Affected

Updated: October 29, 2001

Status

Not Affected

Vendor Statement

See http://www.openssh.com/security.html.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23118892 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

<http://www.ssh.com/products/ssh/cert/&gt;

Acknowledgements

The CERT/CC thanks Antti Huima, Tuomas Aura, and Janne Salmi for their analysis and Tatu Ylonen for bringing this vulnerability to our attention.

This document was written by Jeffrey P. Lanza.

Other Information

CVE IDs: CVE-2000-0217
Severity Metric: 0.42 Date Public:

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

78.4%

Related for VU:118892