CVE-2008-3259Sensitive Information Exposure in Openssh

Severity
1.2LOWNVD
EPSS
0.0%
top 92.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 22
Latest updateMay 1

Description

OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.

CVSS vector

AV:L/AC:H/C:P/I:N/A:NExploitability: 1.9 | Impact: 2.9

Affected Packages1 packages

NVDopenbsd/openssh5.0+70

🔴Vulnerability Details

2
GHSA
GHSA-33jf-4rqx-933q: OpenSSH before 52022-05-01
CVEList
CVE-2008-3259: OpenSSH before 52008-07-22

📋Vendor Advisories

2
Red Hat
openssh: SO_REUSEADDR insecure for X11 forwarding sockets on some platforms2008-05-16
Debian
CVE-2008-3259: openssh - OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost ...2008

💬Community

1
Bugzilla
CVE-2008-3259 openssh: SO_REUSEADDR insecure for X11 forwarding sockets on some platforms2008-07-23
CVE-2008-3259 — Sensitive Information Exposure | cvebase