It was found that the OpenSSH client did not properly enforce the ForwardX11Timeout setting. A malicious or compromised remote X application could possibly use this flaw to establish a trusted connection to the local X server, even if only untrusted X11 forwarding was requested.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | openssh | 2015-07-22 10:00 | ALAS-2015-568 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv2 | 4.9 | AV:N/AC:M/Au:S/C:P/I:N/A:P |
NVD | CVSSv2 | 4.3 | AV:N/AC:M/Au:N/C:N/I:P/A:N |