4.3
CVSSv2

CVE-2015-5352

Published: 03/08/2015 Updated: 13/12/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The x11_open_helper function in channels.c in ssh in OpenSSH prior to 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote malicious users to bypass intended access restrictions via a connection outside of the permitted time window.

Vulnerable Product Search on Vulmon Subscribe to Product

openbsd openssh

Vendor Advisories

USN-2710-1 introduced a regression in OpenSSH ...
Several security issues were fixed in OpenSSH ...
Debian Bug report logs - #790798 openssh: CVE-2015-5352: XSECURITY restrictions bypass under certain conditions in ssh Package: src:openssh; Maintainer for src:openssh is Debian OpenSSH Maintainers <debian-ssh@listsdebianorg>; Reported by: jmm@debianorg Date: Wed, 1 Jul 2015 19:33:02 UTC Severity: important Tags: fixed ...
Debian Bug report logs - #793616 openssh: CVE-2015-5600: MaxAuthTries limit bypass via duplicates in KbdInteractiveDevices Package: src:openssh; Maintainer for src:openssh is Debian OpenSSH Maintainers <debian-ssh@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 25 Jul 2015 15:30:01 ...
Debian Bug report logs - #795711 openssh: CVE-2015-6563 CVE-2015-6564 Package: src:openssh; Maintainer for src:openssh is Debian OpenSSH Maintainers <debian-ssh@listsdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Sun, 16 Aug 2015 12:04:21 UTC Severity: important Tags: security Found in version ...
It was reported that when forwarding X11 connections with ForwardX11Trusted=no, connections made after ForwardX11Timeout expired could be permitted and no longer subject to XSECURITY restrictions because of an ineffective timeout check in ssh(1) coupled with "fail open" behavior in the X11 server when clients attempted connections with expired cred ...
It was found that the OpenSSH client did not properly enforce the ForwardX11Timeout setting A malicious or compromised remote X application could possibly use this flaw to establish a trusted connection to the local X server, even if only untrusted X11 forwarding was requested ...