QID 38906

Date Published: 2023-07-24

QID 38906: OpenSSH Improper Failed Cookie Generation Handling Vulnerability (CVE-2016-1908)

OpenSSH (OpenBSD Secure Shell) is a set of computer programs providing encrypted communication sessions over a computer network using the SSH protocol.

Mishandling of failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server.

Affected Versions:
OpenSSH versions prior to 7.2

QID Detection Logic:
This unauthenticated detection works by reviewing the version of the OpenSSH service.

Successful exploitation allows a remote attacker to obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server resulting in considerable informational disclosure, Modification of some system files or information is possible, and reduced performance or interruptions in resource availability.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Customers are advised to upgrade to OpenSSH 7.2 or later to remediate these vulnerabilities.
    Vendor References

    CVEs related to QID 38906

    Software Advisories
    Advisory ID Software Component Link
    OpenSSH 7.2 URL Logo www.openssh.com/txt/release-7.2