Lucene search

K
certCERTVU:316888
HistoryNov 02, 2015 - 12:00 a.m.

MobaXterm server may allow arbitrary command injection due to missing X11 authentication

2015-11-0200:00:00
www.kb.cert.org
34

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

73.7%

Overview

The MobaXterm server prior to verion 8.3 is vulnerable to arbitrary command injection over port 6000 when using default X11 settings.

Description

CWE-306**: Missing Authentication for Critical Function -**CVE-2015-7244

MobaXterm server prior to version 8.3 includes an X11 server listening on all IP addresses which does not authenticate remote X11 connections over port 6000. A remote attacker may silently connect to the server, and view and inject X11 commands with the privileges of the user currently using MobaXterm.


Impact

An unauthenticated remote attacker may view and inject X11 commands with the privileges of the user currently using MobaXterm.


Solution

Apply an update

Mobatek has released MobaXterm 8.3 which addresses this issue by notifying users of incoming connection attempts and allows the user to accept or decline. Affected users are encouraged to update as soon as possible.


Vendor Information

316888

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Mobatek __ Affected

Notified: September 30, 2015 Updated: October 16, 2015

Statement Date: October 15, 2015

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Addendum

Mobatek has released MobaXterm 8.3 to address this issue.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23316888 Feedback>).

CVSS Metrics

Group Score Vector
Base 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P
Temporal 5.9 E:POC/RL:OF/RC:C
Environmental 4.4 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Bryan Rhodes, Ryan Wincey, Micheal Reski, and Dan Mason for reporting this vulnerability.

This document was written by Garret Wassermann.

Other Information

CVE IDs: CVE-2015-7244
Date Public: 2015-10-31 Date First Published:

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

73.7%

Related for VU:316888