AIX OpenSSH Advisory : ssh_advisory.asc

This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.


Synopsis :

The remote AIX host is running a vulnerable version of OpenSSH.

Description :

The version of OpenSSH running on the remote host is affected by the
following vulnerabilities :

- OpenSSH 4.3p2, and probably other versions, allows local
users to hijack forwarded X connections by causing ssh
to set DISPLAY to :10, even when another process is
listening on the associated port, as demonstrated by
opening TCP port 6010 (IPv4) and sniffing a cookie sent
by Emacs. (CVE-2008-1483)

- OpenSSH before 4.9 allows remote authenticated users to
bypass the sshd_config ForceCommand directive by
modifying the .ssh/rc session file. (CVE-2008-1657)

See also :

http://aix.software.ibm.com/aix/efixes/security/ssh_advisory.asc
https://sourceforge.net/projects/openssh-aix/files/

Solution :

A fix is available and can be downloaded from the OpenSSH sourceforge
website for the AIX release.

Risk factor :

Medium / CVSS Base Score : 6.9
(CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.0
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: AIX Local Security Checks

Nessus Plugin ID: 73565 ()

Bugtraq ID: 28444
28531

CVE ID: CVE-2008-1483
CVE-2008-1657

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now