It was found that the OpenSSH client did not properly enforce the ForwardX11Timeout setting. A malicious or compromised remote X application could possibly use this flaw to establish a trusted connection to the local X server, even if only untrusted X11 forwarding was requested.
Find out more about CVE-2015-5352 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue does not affect the version of openssh package as shipped with Red Hat Enterprise Linux 7. This issue affects the version of openssh package as shipped with Red Hat Enterprise Linux 5 and 6.
Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates.
Base Score | 4.9 |
---|---|
Base Metrics | AV:N/AC:M/Au:S/C:P/I:N/A:P |
Access Vector | Network |
Access Complexity | Medium |
Authentication | Single |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 6 (openssh) | RHSA-2016:0741 | 2016-05-10 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 7 | openssh | Not affected |
Red Hat Enterprise Linux 5 | openssh | Will not fix |