Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-33jf-4rqx-933q

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.

OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.

EPSS

Процентиль: 9%
0.00032
Низкий

Дефекты

CWE-200

Связанные уязвимости

ubuntu
больше 17 лет назад

OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.

redhat
больше 17 лет назад

OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.

nvd
больше 17 лет назад

OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.

debian
больше 17 лет назад

OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11Use ...

EPSS

Процентиль: 9%
0.00032
Низкий

Дефекты

CWE-200