Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-3259

Опубликовано: 22 июл. 2008
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 1.2

Описание

OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.

РелизСтатусПримечание
dapper

not-affected

not an issue under Linux
devel

not-affected

not an issue under Linux
feisty

not-affected

not an issue under Linux
gutsy

not-affected

not an issue under Linux
hardy

not-affected

not an issue under Linux
upstream

released

5.1

Показывать по

Ссылки на источники

EPSS

Процентиль: 8%
0.00032
Низкий

1.2 Low

CVSS2

Связанные уязвимости

redhat
больше 17 лет назад

OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.

nvd
больше 17 лет назад

OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.

debian
больше 17 лет назад

OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11Use ...

github
больше 3 лет назад

OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.

EPSS

Процентиль: 8%
0.00032
Низкий

1.2 Low

CVSS2