### [CVE-2016-1908](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1908) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server. ### POC #### Reference - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html #### Github - https://github.com/RedHatSatellite/satellite-host-cve - https://github.com/phx/cvescan - https://github.com/retr0-13/cveScannerV2 - https://github.com/scmanjarrez/CVEScannerV2 - https://github.com/scmanjarrez/test