2017-10-16 12:31:07 -04:00
{
2019-03-17 22:22:07 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "secalert@redhat.com" ,
"ID" : "CVE-2016-1908" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
2017-10-16 12:31:07 -04:00
{
2019-03-17 22:22:07 +00:00
"lang" : "eng" ,
"value" : "The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server."
2017-10-16 12:31:07 -04:00
}
2019-03-17 22:22:07 +00:00
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "http://www.openssh.com/txt/release-7.2" ,
"refsource" : "CONFIRM" ,
"url" : "http://www.openssh.com/txt/release-7.2"
} ,
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" ,
"refsource" : "CONFIRM" ,
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
} ,
{
"name" : "https://anongit.mindrot.org/openssh.git/commit/?id=ed4ce82dbfa8a3a3c8ea6fa0db113c71e234416c" ,
"refsource" : "CONFIRM" ,
"url" : "https://anongit.mindrot.org/openssh.git/commit/?id=ed4ce82dbfa8a3a3c8ea6fa0db113c71e234416c"
} ,
{
"name" : "[oss-security] 20160115 Re: Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778" ,
"refsource" : "MLIST" ,
"url" : "http://openwall.com/lists/oss-security/2016/01/15/13"
} ,
{
"name" : "1034705" ,
"refsource" : "SECTRACK" ,
"url" : "http://www.securitytracker.com/id/1034705"
} ,
{
"name" : "RHSA-2016:0741" ,
"refsource" : "REDHAT" ,
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0741.html"
} ,
{
"name" : "GLSA-201612-18" ,
"refsource" : "GENTOO" ,
"url" : "https://security.gentoo.org/glsa/201612-18"
} ,
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1298741" ,
"refsource" : "CONFIRM" ,
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1298741"
} ,
{
"name" : "[debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update" ,
"refsource" : "MLIST" ,
"url" : "https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html"
} ,
{
"name" : "84427" ,
"refsource" : "BID" ,
"url" : "http://www.securityfocus.com/bid/84427"
} ,
{
"name" : "RHSA-2016:0465" ,
"refsource" : "REDHAT" ,
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0465.html"
}
]
}
}