Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2007-4752


ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.


Published

2007-09-12T01:17:00.000

Last Modified

2025-04-09T00:30:58.490

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application openbsd openssh ≤ 4.6 Yes
Application openbsd openssh 4.0 Yes
Application openbsd openssh 4.0p1 Yes
Application openbsd openssh 4.1 Yes
Application openbsd openssh 4.1p1 Yes
Application openbsd openssh 4.2 Yes
Application openbsd openssh 4.2p1 Yes
Application openbsd openssh 4.3 Yes
Application openbsd openssh 4.3p1 Yes
Application openbsd openssh 4.3p2 Yes
Application openbsd openssh 4.4 Yes
Application openbsd openssh 4.4p1 Yes
Application openbsd openssh 4.5 Yes

References