CVE-2008-3259

CVSS V2 Low 1.2 CVSS V3 None
Description
OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.
Overview
  • CVE ID
  • CVE-2008-3259
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2008-07-22T16:41:00
  • Last Modified Date
  • 2017-08-08T01:31:43
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:* 1 OR 5.0
cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:1.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:1.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:1.5.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:1.5.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:4.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:4.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:4.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openbsd:openssh:4.9:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:L/AC:H/Au:N/C:P/I:N/A:N
  • Access Vector
  • LOCAL
  • Access Compatibility
  • HIGH
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • NONE
  • Availability Impact
  • NONE
  • Base Score
  • 1.2
  • Severity
  • LOW
  • Exploitability Score
  • 1.9
  • Impact Score
  • 2.9
History
Created Old Value New Value Data Type Notes
2022-05-10 09:06:55 Added to TrackCVE