openssh: restriction bypass
Package(s): | openssh | CVE #(s): | CVE-2015-5352 | ||||||||||||||||||||||||||||||||||||||||||||
Created: | July 6, 2015 | Updated: | July 13, 2015 | ||||||||||||||||||||||||||||||||||||||||||||
Description: | From the Arch Linux advisory:
When forwarding X11 connections with ForwardX11Trusted=no, connections made after ForwardX11Timeout expired could be permitted and no longer subject to XSECURITY restrictions because of an ineffective timeout check in ssh coupled with "fail open" behaviour in the X11 server when clients attempted connections with expired credentials. This problem was reported by Jann Horn. A remote attacker is able to bypass the XSECURITY restrictions when forwarding X11 connections by making use of an ineffective timeout check. | ||||||||||||||||||||||||||||||||||||||||||||||
Alerts: |
|