Vulnerability Name: | CVE-2000-0217 (CCN-4037) |
Assigned: | 2000-02-24 |
Published: | 2000-02-24 |
Updated: | 2008-09-10 |
Summary: | The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
|
CVSS v3 Severity: | 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): High Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): High Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): High Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-Other
|
Vulnerability Consequences: | Gain Access |
References: | Source: CCN Type: BugTraq Mailing List, Thu Feb 24 2000 - 16:31:35 CST SSH & xauth
Source: MITRE Type: CNA CVE-2000-0217
Source: CCN Type: OSVDB ID: 1229 SSH client xauth Session Hijacking
Source: BID Type: UNKNOWN 1006
Source: CCN Type: BID-1006 SSH client xauth Vulnerability
Source: XF Type: UNKNOWN ssh-xauth-client(4037)
|
Vulnerable Configuration: | Configuration 1: cpe:/a:openbsd:openssh:1.2:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.0:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.1:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.2:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.3:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.4:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.5:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.6:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.7:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.8:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.9:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.10:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.11:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.12:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.13:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.14:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.15:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.16:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.17:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.18:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.19:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.20:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.21:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.22:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.23:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.24:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.25:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.26:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.27:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.28:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.29:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.30:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh:1.2.31:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh2:2.0:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh2:2.0.1:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh2:2.0.2:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh2:2.0.3:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh2:2.0.4:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh2:2.0.5:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh2:2.0.6:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh2:2.0.7:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh2:2.0.8:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh2:2.0.9:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh2:2.0.10:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*OR cpe:/a:ssh:ssh2:2.0.12:*:*:*:*:*:*:* Configuration CCN 1: cpe:/a:ssh:ssh:*:*:*:*:*:*:*:*OR cpe:/o:hp:hp-ux:10.20:*:*:*:*:*:*:*AND cpe:/o:sun:sunos:5.5.1:*:*:*:*:*:*:*OR cpe:/o:sun:sunos:5.6:*:*:*:*:*:*:*OR cpe:/o:redhat:linux:6.0:*:*:*:*:*:*:*OR cpe:/o:ibm:aix:4.3:*:*:*:*:*:*:*OR cpe:/o:sun:sunos:5.8:*:*:*:*:*:*:*OR cpe:/o:sun:sunos:5.7:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |