| VID |
14204 |
| Severity |
30 |
| Port |
22 |
| Protocol |
TCP |
| Class |
SSH |
| Detailed Description |
According to its banner, the version of OpenSSH running on the remote host is prior to version 7.2. It is, therefore, affected by a security bypass vulnerability due to a flaw in ssh(1) that is triggered when it falls back from untrusted X11 forwarding to trusted forwarding when the SECURITY extension is disabled by the X server. This can result in untrusted X11 connections that can be exploited by a remote attacker.
* Note: This check solely relied on the banner of the remote SSH server to assess this vulnerability, so this might be a false positive.
* References: http://www.openssh.com/txt/release-7.2
* Platforms Affected: OpenSSH version before 7.2 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of OpenSSH (7.2 or later), available from the OpenSSH Web site at http://www.openssh.org/ |
| Related URL |
(CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|