OpenSSH < 1.2.3 xauth Session Highjacking

medium Nessus Plugin ID 44067


The remote host has an application installed that is affected by a session highjacking vulnerability.


According to its banner, the remote host is running a version of OpenSSH earlier than 1.2.3. Such versions are affected by a session highjacking vulnerability. By default, ssh clients negotiate to forward X connections by using the xauth program to place cookies in the authorization cache of the remote machine for the user that is logging in. It is possible for the xauth key to be read from the user's .Xauthority file which could allow a remote attacker to control the client's X sessions via a malicious xauth program.


Upgrade to OpenSSH 1.2.3 or later.

See Also

Plugin Details

Severity: Medium

ID: 44067

File Name: openssh_123.nasl

Version: 1.7

Type: remote

Family: Misc.

Published: 10/4/2011

Updated: 11/15/2018

Risk Information


Risk Factor: Medium

Score: 5.2


Risk Factor: Medium

Base Score: 5.1

Temporal Score: 3.8

Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:openbsd:openssh

Exploit Ease: No known exploits are available

Patch Publication Date: 3/17/2000

Vulnerability Publication Date: 2/24/2000

Reference Information

CVE: CVE-2000-0217

BID: 1006