Files
CVEs-PoC/2016/CVE-2016-1908.md
2024-06-18 02:51:15 +02:00

22 lines
1.0 KiB
Markdown

### [CVE-2016-1908](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1908)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
### POC
#### Reference
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
#### Github
- https://github.com/RedHatSatellite/satellite-host-cve
- https://github.com/phx/cvescan
- https://github.com/retr0-13/cveScannerV2
- https://github.com/scmanjarrez/CVEScannerV2
- https://github.com/scmanjarrez/test