Summary
OpenSSH is prone to a vulnerability that allows attackers to hijack forwarded X connections.
Successfully exploiting this issue may allow an attacker run arbitrary shell commands with the privileges of the user running the affected application.
This issue affects OpenSSH 4.3p2
other versions may also be affected.
NOTE: This issue affects the portable version of OpenSSH and may not affect OpenSSH running on OpenBSD.
Solution
Updates are available. Please see the references for more information.
References
- http://aix.software.ibm.com/aix/efixes/security/ssh_advisory.asc
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463011
- http://sourceforge.net/project/shownotes.php?release_id=590180
- http://support.apple.com/kb/HT3137
- http://support.attachmate.com/techdocs/2374.html#Security_Updates_in_7.0_SP1
- http://support.avaya.com/elmodocs2/security/ASA-2008-205.htm
- http://www.globus.org/mail_archive/security-announce/2008/04/msg00000.html
- http://www.openbsd.org/errata41.html
- http://www.openbsd.org/errata42.html
- http://www.openbsd.org/errata43.html
- http://www.openssh.com
- http://www.openssh.com/txt/release-5.0
- http://www.securityfocus.com/archive/1/492447
- http://www.securityfocus.com/bid/28444
Updated on 2017-03-28
Severity
Classification
-
CVE CVE-2008-1483 -
CVSS Base Score: 6.9
AV:L/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Adobe Reader 'SWF' Information Disclosure Vulnerability (Windows)
- Apple Safari Secure Cookie Security Bypass Vulnerability (Windows)
- Apple Safari Multiple Memory Corruption Vulnerabilities-02 Aug14 (Mac OS X)
- Apple Safari 'setInterval()' Address Bar Spoofing Vulnerability (Win)
- Adobe Reader Plugin Signature Bypass Vulnerability (Mac OS X)