AIX OpenSSH Advisory : ssh_advisory.asc

This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.

Synopsis :

The remote AIX host is running a vulnerable version of OpenSSH.

Description :

The version of OpenSSH running on the remote host is affected by the
following vulnerabilities :

- OpenSSH 4.3p2, and probably other versions, allows local
users to hijack forwarded X connections by causing ssh
to set DISPLAY to :10, even when another process is
listening on the associated port, as demonstrated by
opening TCP port 6010 (IPv4) and sniffing a cookie sent
by Emacs. (CVE-2008-1483)

- OpenSSH before 4.9 allows remote authenticated users to
bypass the sshd_config ForceCommand directive by
modifying the .ssh/rc session file. (CVE-2008-1657)

See also :

Solution :

A fix is available and can be downloaded from the OpenSSH sourceforge
website for the AIX release.

Risk factor :

Medium / CVSS Base Score : 6.9
CVSS Temporal Score : 6.0
Public Exploit Available : false

Family: AIX Local Security Checks

Nessus Plugin ID: 73565 ()

Bugtraq ID: 28444

CVE ID: CVE-2008-1483

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now