Lucene search

K
ubuntucveUbuntu.comUB:CVE-2016-1908
HistoryJan 15, 2016 - 12:00 a.m.

CVE-2016-1908

2016-01-1500:00:00
ubuntu.com
ubuntu.com
11

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

72.2%

The client in OpenSSH before 7.2 mishandles failed cookie generation for
untrusted X11 forwarding and relies on the local X11 server for
access-control decisions, which allows remote X11 clients to trigger a
fallback and obtain trusted X11 forwarding privileges by leveraging
configuration issues on this X11 server, as demonstrated by lack of the
SECURITY extension on this X11 server.

Bugs

Notes

Author Note
sbeattie first patch needs to be applied before second one, which addresses the issue
mdeslaur contrary to release not, not fixed in 7.1p2: http://lists.mindrot.org/pipermail/openssh-unix-dev/2016-January/034684.html
OSVersionArchitecturePackageVersionFilename
ubuntu12.04noarchopenssh< 1:5.9p1-5ubuntu1.9UNKNOWN
ubuntu14.04noarchopenssh< 1:6.6p1-2ubuntu2.7UNKNOWN
ubuntu15.10noarchopenssh< 1:6.9p1-2ubuntu0.2UNKNOWN

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

72.2%