FKIE_CVE-2000-0217
Vulnerability from fkie_nvd - Published: 2000-02-24 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| openbsd | openssh | 1.2 | |
| ssh | ssh | 1.2.0 | |
| ssh | ssh | 1.2.1 | |
| ssh | ssh | 1.2.2 | |
| ssh | ssh | 1.2.3 | |
| ssh | ssh | 1.2.4 | |
| ssh | ssh | 1.2.5 | |
| ssh | ssh | 1.2.6 | |
| ssh | ssh | 1.2.7 | |
| ssh | ssh | 1.2.8 | |
| ssh | ssh | 1.2.9 | |
| ssh | ssh | 1.2.10 | |
| ssh | ssh | 1.2.11 | |
| ssh | ssh | 1.2.12 | |
| ssh | ssh | 1.2.13 | |
| ssh | ssh | 1.2.14 | |
| ssh | ssh | 1.2.15 | |
| ssh | ssh | 1.2.16 | |
| ssh | ssh | 1.2.17 | |
| ssh | ssh | 1.2.18 | |
| ssh | ssh | 1.2.19 | |
| ssh | ssh | 1.2.20 | |
| ssh | ssh | 1.2.21 | |
| ssh | ssh | 1.2.22 | |
| ssh | ssh | 1.2.23 | |
| ssh | ssh | 1.2.24 | |
| ssh | ssh | 1.2.25 | |
| ssh | ssh | 1.2.26 | |
| ssh | ssh | 1.2.27 | |
| ssh | ssh | 1.2.28 | |
| ssh | ssh | 1.2.29 | |
| ssh | ssh | 1.2.30 | |
| ssh | ssh | 1.2.31 | |
| ssh | ssh2 | 2.0 | |
| ssh | ssh2 | 2.0.1 | |
| ssh | ssh2 | 2.0.2 | |
| ssh | ssh2 | 2.0.3 | |
| ssh | ssh2 | 2.0.4 | |
| ssh | ssh2 | 2.0.5 | |
| ssh | ssh2 | 2.0.6 | |
| ssh | ssh2 | 2.0.7 | |
| ssh | ssh2 | 2.0.8 | |
| ssh | ssh2 | 2.0.9 | |
| ssh | ssh2 | 2.0.10 | |
| ssh | ssh2 | 2.0.11 | |
| ssh | ssh2 | 2.0.12 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "316C8534-9CE3-456C-A04E-5D2B789FBE31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1E9C3330-E163-4699-B7F6-2D9B089E8A6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F62C0C54-6BC0-4A8B-8006-F1EEEFAC3699",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "011ECCA8-63DD-4FB0-A2F4-B4BAF344242E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "86A52DB0-B17A-437C-8E3A-0F824B9F88AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8EDDCCD5-76B1-4981-BA9D-0C4702DD3FBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6A9E54C6-7003-46B0-85B3-0C2E7E611D38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "082C8ECC-CDAF-440B-90D0-A1FE028B03F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7D0AAA72-CAA5-4985-ADD9-1790CE3C66D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C0C2A220-D8AB-4FAD-8048-F2C1764F965F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5010A78A-394E-4196-90CB-5D371C3BD1EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E5F6F181-41B1-47D1-A216-194DC4C762EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "D6EEBDAB-AA0D-407B-B8EE-6C33B0423AF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "45446BD9-3B03-43B6-B686-F6EACFABD699",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "FCE6F492-8E28-4FA1-9BF1-96BAF5D68545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "41BF66ED-CB08-440E-AC05-A31371B7A380",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E0EE3216-D8FF-43F0-9329-6676E2CEC250",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9310E12D-1136-4AD6-9678-8ADCD9EE58C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "BBEDF399-58DE-491A-8B51-87E0392FF9C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "CBDF2DE8-8559-4BED-80AE-E1420BBF4043",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "23EB8421-76BF-47D1-B294-68412D5E4572",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "D9560989-5342-4C6B-974F-7D90C467BA39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "971835AF-E908-4C74-9DE0-167349138DEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0D49C5-54B4-4437-A2D3-3EBFA1D9A3CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "926B57D7-009C-4317-ACFB-98551FADC5B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "B0EDBA45-FDEE-4D4B-A6FF-7E953B523DAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*",
"matchCriteriaId": "7D0FF07F-E13B-425F-9892-C50B326B2944",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
"matchCriteriaId": "338EDA76-05D6-48C0-952E-6244A5F206F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "F719468E-A218-4EB5-9F8D-7841E84F44C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*",
"matchCriteriaId": "1E4FCD36-0009-4A93-A190-8FDD11C672CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "71727854-1B75-465F-AF8C-DFE6EFF46B40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*",
"matchCriteriaId": "64B76EA2-D3A6-4751-ADE6-998C2A7B44FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh2:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A7DB2FA-58A8-45B9-AE2E-AE20A872BF90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh2:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2DD92EA8-8C01-4E4E-9AFE-2B1242AB10CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh2:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6FB31028-59BA-4833-BF14-3CB1CA18DAAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh2:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8A3E89B6-872D-4541-A413-88A956FDAE81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh2:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "98CC86ED-CA78-4E2A-8A12-4F766DB79733",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh2:2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BD500A33-4D0E-44B5-9BBE-A30AA999F662",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh2:2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "EBB8D72F-51E7-47DF-96A4-4EBB517A79D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh2:2.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2379BA-621E-4986-AAC5-AF359FD57381",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh2:2.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "9972B3A4-369E-40B5-9415-F92B7394604A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh2:2.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "1B6E719F-010B-4B8A-B508-0491BD15C465",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh2:2.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E44D2AE3-DD8B-46D0-B6AB-9F0E6B4DCC4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "B7735CDD-8BFC-4E30-9C88-27C8943637CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssh:ssh2:2.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "A1582187-F4BA-44D6-97F0-E78D814A9E9E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client\u0027s X sessions via a malicious xauth program."
}
],
"id": "CVE-2000-0217",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2000-02-24T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/1006"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/1006"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…