First published: Tue Jul 22 2008(Updated: )
OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | =3.8 | |
OpenSSH | =3.8.1p1 | |
OpenSSH | =4.3p2 | |
OpenSSH | =3.2.2 | |
OpenSSH | =3.1 | |
OpenSSH | =3.0.2p1 | |
OpenSSH | =1.5.8 | |
OpenSSH | <=5.0 | |
OpenSSH | =4.1 | |
OpenSSH | =3.8.1 | |
OpenSSH | =2.1.1 | |
OpenSSH | =3.7.1p2 | |
OpenSSH | =4.8 | |
OpenSSH | =4.9 | |
OpenSSH | =3.2.3p1 | |
OpenSSH | =3.1p1 | |
OpenSSH | =2.5.1 | |
OpenSSH | =2.9.9p2 | |
OpenSSH | =3.6.1p2 | |
OpenSSH | =3.9 | |
OpenSSH | =3.0 | |
OpenSSH | =1.2.1 | |
OpenSSH | =2.2 | |
OpenSSH | =3.2 | |
OpenSSH | =3.6 | |
OpenSSH | =4.7 | |
OpenSSH | =1.5.7 | |
OpenSSH | =1.2.3 | |
OpenSSH | =3.7 | |
OpenSSH | =4.0p1 | |
OpenSSH | =3.5p1 | |
OpenSSH | =2.3.1 | |
OpenSSH | =3.0.1p1 | |
OpenSSH | =4.4 | |
OpenSSH | =3.7.1p1 | |
OpenSSH | =2.1 | |
OpenSSH | =1.2 | |
OpenSSH | =3.3 | |
OpenSSH | =3.2.2p1 | |
OpenSSH | =3.9.1p1 | |
OpenSSH | =3.0.2 | |
OpenSSH | =3.4p1 | |
OpenSSH | =3.6.1p1 | |
OpenSSH | =3.0.1 | |
OpenSSH | =2.9.9 | |
OpenSSH | =3.6.1 | |
OpenSSH | =4.1p1 | |
OpenSSH | =1.2.2 | |
OpenSSH | =4.2p1 | |
OpenSSH | =4.5 | |
OpenSSH | =2.9p1 | |
OpenSSH | =2.9 | |
OpenSSH | =3.7.1 | |
OpenSSH | =1.2.27 | |
OpenSSH | =4.2 | |
OpenSSH | =2.5.2 | |
OpenSSH | =2.3 | |
OpenSSH | =3.4 | |
OpenSSH | =4.4p1 | |
OpenSSH | =4.3p1 | |
OpenSSH | =3.5 | |
OpenSSH | =2.5 | |
OpenSSH | =3.0p1 | |
OpenSSH | =3.3p1 | |
OpenSSH | =4.3 | |
OpenSSH | =4.0 | |
OpenSSH | =3.9.1 | |
OpenSSH | =1.3 | |
OpenSSH | =2.9p2 | |
OpenSSH | =1.5 | |
OpenSSH | =4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3259 is considered to have a high severity level as it allows local users to hijack an X11 forwarding port.
To fix CVE-2008-3259, enable the X11UseLocalhost setting in the OpenSSH configuration.
OpenSSH versions prior to 5.1, including 3.1 through 5.0, are affected by CVE-2008-3259.
Local users on systems running vulnerable versions of OpenSSH are at risk due to CVE-2008-3259.
CVE-2008-3259 involves the improper setting of the SO_REUSEADDR socket option when X11UseLocalhost is disabled, allowing port hijacking.