First published: Wed Sep 12 2007(Updated: )
ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | =4.3p2 | |
OpenSSH | <=4.6 | |
OpenSSH | =4.1 | |
OpenSSH | =4.0p1 | |
OpenSSH | =4.4 | |
OpenSSH | =4.1p1 | |
OpenSSH | =4.2p1 | |
OpenSSH | =4.5 | |
OpenSSH | =4.2 | |
OpenSSH | =4.4p1 | |
OpenSSH | =4.3p1 | |
OpenSSH | =4.3 | |
OpenSSH | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4752 has a moderate severity rating as it allows attackers to gain privileges through improper handling of untrusted cookies.
To fix CVE-2007-4752, upgrade OpenSSH to version 4.7 or later, where this vulnerability has been addressed.
CVE-2007-4752 affects OpenSSH versions prior to 4.7, including 4.6 and earlier.
The potential consequences of CVE-2007-4752 include unauthorized privilege escalation and security policy violations.
Yes, CVE-2007-4752 is a documented vulnerability that has been acknowledged within the cybersecurity community.