First published: Wed Sep 12 2007(Updated: )
ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openbsd Openssh | =4.3p2 | |
Openbsd Openssh | <=4.6 | |
Openbsd Openssh | =4.1 | |
Openbsd Openssh | =4.0p1 | |
Openbsd Openssh | =4.4 | |
Openbsd Openssh | =4.1p1 | |
Openbsd Openssh | =4.2p1 | |
Openbsd Openssh | =4.5 | |
Openbsd Openssh | =4.2 | |
Openbsd Openssh | =4.4p1 | |
Openbsd Openssh | =4.3p1 | |
Openbsd Openssh | =4.3 | |
Openbsd Openssh | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.