CVE-2008-1483

N/A Unknown
Published: March 24, 2008 Modified: April 23, 2026
View on NVD

Description

OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/29522
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/29537
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/29554
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/29626
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/29676
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/29683
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/29686
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/29721
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/29735
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/29873
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/29939
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/30086
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/30230
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/30249
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/30361
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/31531
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/31882
Source: cve@mitre.org
Vendor Advisory
http://www.us-cert.gov/cas/techalerts/TA08-260A.html
Source: cve@mitre.org
US Government Resource
https://usn.ubuntu.com/597-1/
Source: cve@mitre.org
http://aix.software.ibm.com/aix/efixes/security/ssh_advisory.asc
Source: af854a3a-2127-422b-91ae-364da2661108
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463011
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29522
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/29537
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/29554
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/29626
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/29676
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/29683
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/29686
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/29721
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/29735
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/29873
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/29939
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/30086
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/30230
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/30249
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/30347
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/30361
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/31531
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/31882
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-237444-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.attachmate.com/techdocs/2374.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.avaya.com/elmodocs2/security/ASA-2008-205.htm
Source: af854a3a-2127-422b-91ae-364da2661108
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0120
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2008/dsa-1576
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-200804-03.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2008:078
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/490054/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/28444
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1019707
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA08-260A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vupen.com/english/advisories/2008/0994/references
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/1123/references
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/1124/references
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/1448/references
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/1526/references
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/1624/references
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/1630/references
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/2396
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/2584
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/41438
Source: af854a3a-2127-422b-91ae-364da2661108
https://issues.rpath.com/browse/RPL-2397
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/597-1/
Source: af854a3a-2127-422b-91ae-364da2661108

108 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.2%
42th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

openbsd