CVE-2008-3259

Impact:
Low
Public Date:
2008-05-16
Bugzilla:
456426: CVE-2008-3259 openssh: SO_REUSEADDR insecure for X11 forwarding sockets on some platforms

The MITRE CVE dictionary describes this issue as:

OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.

Find out more about CVE-2008-3259 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

Not vulnerable. This issue did not affect the versions of openssh as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.