Vulnerability CVE-2008-3259


Published: 2008-07-22   Modified: 2012-02-12

Description:
OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.

Type:

CWE-200

(Information Exposure)

CVSS2 => (AV:L/AC:H/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
1.2/10
2.9/10
1.9/10
Exploit range
Attack complexity
Authentication
Local
High
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Openssh -> Openssh 
Openbsd -> Openssh 

 References:
http://xforce.iss.net/xforce/xfdb/43940
http://www.vupen.com/english/advisories/2008/2148
http://www.securitytracker.com/id?1020537
http://www.securityfocus.com/bid/30339
http://www.openssh.com/txt/release-5.1
http://secunia.com/advisories/31179
http://openssh.com/security.html

Copyright 2024, cxsecurity.com

 

Back to Top