Joined: 12 May 2004
|Posted: Fri Nov 02, 2007 12:26 am Post subject: [ GLSA 200711-02 ] OpenSSH: Security bypass
|Gentoo Linux Security Advisory
Title: OpenSSH: Security bypass (GLSA 200711-02)
Date: November 01, 2007
A flaw has been discovered in OpenSSH which could allow a local attacker to bypass security restrictions.
OpenSSH is a complete SSH protocol implementation that includes an SFTP client and server support.
Vulnerable: < 4.7
Unaffected: >= 4.7
Architectures: All supported architectures
Jan Pechanec discovered that OpenSSH uses a trusted X11 cookie when it cannot create an untrusted one.
An attacker could bypass the SSH client security policy and gain privileges by causing an X client to be treated as trusted.
There is no known workaround at this time.
All OpenSSH users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/openssh-4.7"
Last edited by GLSA on Fri Feb 22, 2008 4:20 am; edited 2 times in total