OpenSSH Client X11 Forwarding Cookie Removal File Symbolic Link Vulnerability

Bugtraq ID: 2825
Class: Access Validation Error
CVE:
Remote: No
Local: Yes
Published: Jun 04 2001 12:00AM
Updated: Jun 04 2001 12:00AM
Credit: This vulnerability was first announced to Bugtraq by zen-parse <zen-parse@gmx.net> on June 4, 2001.
Vulnerable: OpenBSD OpenSSH 2.9 p1
- Caldera OpenLinux 2.4
- Debian Linux 2.2
- HP HP-UX 11.11
- IBM AIX 4.3.3
- MandrakeSoft Corporate Server 1.0.1
- MandrakeSoft Single Network Firewall 7.2
- Mandriva Linux Mandrake 8.1 ia64
- Mandriva Linux Mandrake 8.1
- Mandriva Linux Mandrake 8.0 ppc
- Mandriva Linux Mandrake 8.0
- Mandriva Linux Mandrake 7.2
- Mandriva Linux Mandrake 7.1
- Red Hat Linux 6.2
- RedHat Linux 7.1
- RedHat Linux 7.0
- S.u.S.E. Linux 7.1
- S.u.S.E. Linux 7.0
- SCO eDesktop 2.4
- SCO eServer 2.3.1
- SGI IRIX 6.5.9
- Sun Solaris 8_sparc
- Sun Solaris 7.0
- Sun Solaris 2.6
OpenBSD OpenSSH 2.9
+ FreeBSD FreeBSD 4.4
+ OpenBSD OpenBSD 2.9
OpenBSD OpenSSH 2.5.2 p2
+ RedHat Linux 7.0
OpenBSD OpenSSH 2.5.2
OpenBSD OpenSSH 2.3.1
- OpenBSD OpenBSD 2.8
- OpenBSD OpenBSD 2.7
- OpenBSD OpenBSD 2.6
OpenBSD OpenSSH 2.2 .0
OpenBSD OpenSSH 2.1.1
Not Vulnerable:


 

Privacy Statement
Copyright 2010, SecurityFocus