CVE-2000-0217
CVSS5.1
发布时间 :2000-02-24 00:00:00
修订时间 :2008-09-10 15:03:19
NMCO    

[原文]The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.


[CNNVD]SSH客户端xauth漏洞(CNNVD-200002-070)

        SSH默认配置允许X转发。远程攻击者借助恶意xauth 程序可以控制客户端的X会话。

- CVSS (基础分值)

CVSS分值: 5.1 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:ssh:ssh:1.2.6SSH Communications Security SSH daemon 1.2.6
cpe:/a:ssh:ssh:1.2.19SSH Communications Security SSH daemon 1.2.19
cpe:/a:ssh:ssh:1.2.24SSH Communications Security SSH daemon 1.2.24
cpe:/a:ssh:ssh2:2.0.7SSH Communications Security SSH2 2.0.7
cpe:/a:ssh:ssh2:2.0.11SSH Communications Security SSH2 2.0.11
cpe:/a:ssh:ssh2:2.0.1SSH Communications Security SSH2 2.0.1
cpe:/a:ssh:ssh2:2.0.8SSH Communications Security SSH2 2.0.8
cpe:/a:ssh:ssh2:2.0.4SSH Communications Security SSH2 2.0.4
cpe:/a:ssh:ssh:1.2.28SSH Communications Security SSH daemon 1.2.28
cpe:/a:ssh:ssh:1.2.18SSH Communications Security SSH daemon 1.2.18
cpe:/a:ssh:ssh:1.2.12SSH Communications Security SSH daemon 1.2.12
cpe:/a:ssh:ssh:1.2.8SSH Communications Security SSH daemon 1.2.8
cpe:/a:ssh:ssh:1.2.30SSH Communications Security SSH daemon 1.2.30
cpe:/a:ssh:ssh:1.2.29SSH Communications Security SSH daemon 1.2.29
cpe:/a:ssh:ssh:1.2.13SSH Communications Security SSH daemon 1.2.13
cpe:/a:ssh:ssh2:2.0.3SSH Communications Security SSH2 2.0.3
cpe:/a:ssh:ssh:1.2.20SSH Communications Security SSH daemon 1.2.20
cpe:/a:ssh:ssh:1.2.17SSH Communications Security SSH daemon 1.2.17
cpe:/a:ssh:ssh:1.2.3SSH Communications Security SSH daemon 1.2.3
cpe:/a:ssh:ssh2:2.0.2SSH Communications Security SSH2 2.0.2
cpe:/a:ssh:ssh:1.2.0SSH Communications Security SSH daemon 1.2.0
cpe:/a:ssh:ssh:1.2.2SSH Communications Security SSH daemon 1.2.2
cpe:/a:ssh:ssh:1.2.23SSH Communications Security SSH daemon 1.2.23
cpe:/a:ssh:ssh:1.2.26SSH Communications Security SSH daemon 1.2.26
cpe:/a:ssh:ssh:1.2.4SSH Communications Security SSH daemon 1.2.4
cpe:/a:ssh:ssh:1.2.10SSH Communications Security SSH daemon 1.2.10
cpe:/a:ssh:ssh:1.2.16SSH Communications Security SSH daemon 1.2.16
cpe:/a:ssh:ssh2:2.0.5SSH Communications Security SSH2 2.0.5
cpe:/a:ssh:ssh:1.2.5SSH Communications Security SSH daemon 1.2.5
cpe:/a:ssh:ssh:1.2.27SSH Communications Security SSH daemon 1.2.27
cpe:/a:ssh:ssh2:2.0.10SSH Communications Security SSH2 2.0.10
cpe:/a:ssh:ssh:1.2.11SSH Communications Security SSH daemon 1.2.11
cpe:/a:ssh:ssh2:2.0.6SSH Communications Security SSH2 2.0.6
cpe:/a:ssh:ssh2:2.0
cpe:/a:ssh:ssh:1.2.7SSH Communications Security SSH daemon 1.2.7
cpe:/a:ssh:ssh:1.2.25SSH Communications Security SSH daemon 1.2.25
cpe:/a:ssh:ssh:1.2.9SSH Communications Security SSH daemon 1.2.9
cpe:/a:ssh:ssh:1.2.22SSH Communications Security SSH daemon 1.2.22
cpe:/a:ssh:ssh:1.2.14SSH Communications Security SSH daemon 1.2.14
cpe:/a:ssh:ssh2:2.0.9SSH Communications Security SSH2 2.0.9
cpe:/a:ssh:ssh2:2.0.12SSH Communications Security SSH2 2.0.12
cpe:/a:openbsd:openssh:1.2OpenBSD OpenSSH 1.2
cpe:/a:ssh:ssh:1.2.15SSH Communications Security SSH daemon 1.2.15
cpe:/a:ssh:ssh:1.2.31SSH Communications Security SSH daemon 1.2.31
cpe:/a:ssh:ssh:1.2.21SSH Communications Security SSH daemon 1.2.21
cpe:/a:ssh:ssh:1.2.1SSH Communications Security SSH daemon 1.2.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0217
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0217
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200002-070
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/1006
(UNKNOWN)  BID  1006

- 漏洞信息

SSH客户端xauth漏洞
中危 配置错误
2000-02-24 00:00:00 2006-09-05 00:00:00
远程※本地  
        SSH默认配置允许X转发。远程攻击者借助恶意xauth 程序可以控制客户端的X会话。

- 公告与补丁

        Currently the SecurityFocus staff are not ware of any vendor supplied patches for SSH. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.
        A suitable fix is to disable X forwarding from being enabled by default. This can be permanantly done in the /etc/ssh_config file, or in $HOME/.ssh/config for individual hosts.
        Host *
         ForwardX11 no
        OpenSSH has issued a new version that remedies this problem. Versions released after February 29, 2000 should not be susceptible. They are available at
        http://www.openssh.com/

- 漏洞信息

1229
SSH client xauth Session Hijacking

- 漏洞描述

Unknown or Incomplete

- 时间线

2000-02-24 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站