Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-5352

Опубликовано: 03 авг. 2015
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.3

Описание

The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.

РелизСтатусПримечание
devel

released

1:6.7p1-6ubuntu1
esm-infra-legacy/trusty

not-affected

1:6.6p1-2ubuntu2.2
precise

released

1:5.9p1-5ubuntu1.6
trusty

released

1:6.6p1-2ubuntu2.2
trusty/esm

not-affected

1:6.6p1-2ubuntu2.2
upstream

released

6.9
utopic

ignored

end of life
vivid

released

1:6.7p1-5ubuntu1.2
vivid/stable-phone-overlay

ignored

end of life, was pending
vivid/ubuntu-core

released

1:6.7p1-5ubuntu1.2

Показывать по

EPSS

Процентиль: 90%
0.05487
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

redhat
около 10 лет назад

The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.

nvd
около 10 лет назад

The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.

debian
около 10 лет назад

The x11_open_helper function in channels.c in ssh in OpenSSH before 6. ...

github
больше 3 лет назад

The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.

CVSS3: 3.1
fstec
около 10 лет назад

Уязвимость средства криптографической защиты OpenSSH, связанная с ошибками управления привилегиями, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

EPSS

Процентиль: 90%
0.05487
Низкий

4.3 Medium

CVSS2