First published: Thu Feb 24 2000(Updated: )
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SSH (Secure Shell) | =1.2.6 | |
SSH (Secure Shell) | =1.2.0 | |
SSH (Secure Shell) | =2.0.3 | |
SSH (Secure Shell) | =2.0.8 | |
SSH (Secure Shell) | =1.2.9 | |
SSH (Secure Shell) | =1.2.21 | |
SSH (Secure Shell) | =1.2.15 | |
SSH (Secure Shell) | =2.0.11 | |
SSH (Secure Shell) | =2.0.9 | |
SSH (Secure Shell) | =1.2.4 | |
SSH (Secure Shell) | =1.2.14 | |
SSH (Secure Shell) | =1.2.19 | |
SSH (Secure Shell) | =2.0 | |
SSH (Secure Shell) | =2.0.5 | |
SSH (Secure Shell) | =1.2.8 | |
SSH (Secure Shell) | =1.2.31 | |
SSH (Secure Shell) | =1.2.24 | |
SSH (Secure Shell) | =1.2.18 | |
SSH (Secure Shell) | =1.2.7 | |
SSH (Secure Shell) | =1.2.20 | |
OpenSSH | =1.2 | |
SSH (Secure Shell) | =1.2.3 | |
SSH (Secure Shell) | =1.2.12 | |
SSH (Secure Shell) | =1.2.25 | |
SSH (Secure Shell) | =1.2.17 | |
SSH (Secure Shell) | =2.0.6 | |
SSH (Secure Shell) | =2.0.4 | |
SSH (Secure Shell) | =1.2.30 | |
SSH (Secure Shell) | =1.2.1 | |
SSH (Secure Shell) | =1.2.26 | |
SSH (Secure Shell) | =1.2.27 | |
SSH (Secure Shell) | =1.2.16 | |
SSH (Secure Shell) | =1.2.28 | |
SSH (Secure Shell) | =2.0.1 | |
SSH (Secure Shell) | =1.2.29 | |
SSH (Secure Shell) | =1.2.11 | |
SSH (Secure Shell) | =1.2.5 | |
SSH (Secure Shell) | =2.0.10 | |
SSH (Secure Shell) | =1.2.13 | |
SSH (Secure Shell) | =1.2.22 | |
SSH (Secure Shell) | =1.2.2 | |
SSH (Secure Shell) | =1.2.23 | |
SSH (Secure Shell) | =2.0.12 | |
SSH (Secure Shell) | =1.2.10 | |
SSH (Secure Shell) | =2.0.7 | |
SSH (Secure Shell) | =2.0.2 | |
=1.2 | ||
=1.2.0 | ||
=1.2.1 | ||
=1.2.2 | ||
=1.2.3 | ||
=1.2.4 | ||
=1.2.5 | ||
=1.2.6 | ||
=1.2.7 | ||
=1.2.8 | ||
=1.2.9 | ||
=1.2.10 | ||
=1.2.11 | ||
=1.2.12 | ||
=1.2.13 | ||
=1.2.14 | ||
=1.2.15 | ||
=1.2.16 | ||
=1.2.17 | ||
=1.2.18 | ||
=1.2.19 | ||
=1.2.20 | ||
=1.2.21 | ||
=1.2.22 | ||
=1.2.23 | ||
=1.2.24 | ||
=1.2.25 | ||
=1.2.26 | ||
=1.2.27 | ||
=1.2.28 | ||
=1.2.29 | ||
=1.2.30 | ||
=1.2.31 | ||
=2.0 | ||
=2.0.1 | ||
=2.0.2 | ||
=2.0.3 | ||
=2.0.4 | ||
=2.0.5 | ||
=2.0.6 | ||
=2.0.7 | ||
=2.0.8 | ||
=2.0.9 | ||
=2.0.10 | ||
=2.0.11 | ||
=2.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0217 is classified as a moderate severity vulnerability due to its potential to allow unauthorized control over a client's X sessions.
To fix CVE-2000-0217, disable X11 forwarding in the SSH configuration by setting 'X11Forwarding no'.
CVE-2000-0217 affects multiple versions of SSH including 1.2.0, 1.2.6, 1.2.9, and 2.0.3 among others.
The risks include unauthorized remote access to graphical sessions and the potential execution of arbitrary commands on the affected system.
While CVE-2000-0217 pertains to older versions of SSH, systems running outdated SSH versions may still be at risk if X forwarding is enabled.