CVE-2008-3259

Published Jul 22, 2008

Last updated 7 years ago

Overview

Description
OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.
Source
cve@mitre.org
NVD status
Modified

Social media

Hype score
Not currently trending

Risk scores

CVSS 2.0

Type
Primary
Base score
1.2
Impact score
2.9
Exploitability score
1.9
Vector string
AV:L/AC:H/Au:N/C:P/I:N/A:N

Weaknesses

nvd@nist.gov
CWE-200

Vendor comments

  • Red HatNot vulnerable. This issue did not affect the versions of openssh as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.

Configurations