Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 7 Apr 2008 19:18:33 +0400
From:      Eygene Ryabinkin <rea-fbsd@codelabs.ru>
To:        secteam@FreeBSD.org
Cc:        freebsd-security@freebsd.org, security-officer@FreeBSD.org, des@freebsd.org
Subject:   CVE-2008-1483: OpenSSH X11 connection hijacking
Message-ID:  <LJbCkw%2BSLF%2BlkYnfFJ8b65VtMP8@cjW5GVTI7ri6v9B7L0rJJXtFD%2BY>

next in thread | raw e-mail | index | archive | help

Good day.

I just read the security alert from the Globus Alliance and want
to pass this information to the FreeBSD security people.  Apologies
if the issue is already known and is worked on.  Since the information
was already disclosed into the public, I am CC'ing to the
freebsd-security mailing list.

The following sources show that OpenBSD <= 4.9 are affected by
the local X11 connection hijacking:
  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463011
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1483
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1483
  http://www.openssh.org/txt/release-5.0

The following patch is said to cure the problem:
  http://cvs.fedora.redhat.com/viewcvs/rpms/openssh/devel/openssh-3.9p1-skip-used.patch?rev=1.1&view=markup

Adding 'AddressFamily inet' or using IPv6-disabled system configuration
shoud eliminate the issue.  But the default configuration of SSH
and/or FreeBSD kernel uses AddressFamily of 'any' and has IPv6 enabled
in the GENERIC kernel, so it can be affected.  Unable to test it by
myself, since all FreeBSD systems I have at hand are running IPv4 only.
-- 
Eygene



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?LJbCkw%2BSLF%2BlkYnfFJ8b65VtMP8>