OpenSSH < 1.2.3 xauth Session Highjacking

medium Nessus Plugin ID 44067

Synopsis

The remote host has an application installed that is affected by a session highjacking vulnerability.

Description

According to its banner, the remote host is running a version of OpenSSH earlier than 1.2.3. Such versions are affected by a session highjacking vulnerability. By default, ssh clients negotiate to forward X connections by using the xauth program to place cookies in the authorization cache of the remote machine for the user that is logging in. It is possible for the xauth key to be read from the user's .Xauthority file which could allow a remote attacker to control the client's X sessions via a malicious xauth program.

Solution

Upgrade to OpenSSH 1.2.3 or later.

See Also

https://www.openssh.com/txt/release-1.2.3p1

https://www.openssh.com/security.html

https://marc.info/?l=bugtraq&m=95151911210810&w=4

Plugin Details

Severity: Medium

ID: 44067

File Name: openssh_123.nasl

Version: 1.8

Type: remote

Family: Misc.

Published: 10/4/2011

Updated: 3/27/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 3.8

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:openbsd:openssh

Required KB Items: installed_sw/OpenSSH

Exploit Ease: No known exploits are available

Patch Publication Date: 3/17/2000

Vulnerability Publication Date: 2/24/2000

Reference Information

CVE: CVE-2000-0217

BID: 1006