Vulnerability Note VU#363181

OpenSSH disregards client configuration and allows server access to ssh-agent and/or X11 after session negotiation

Original Release date: 13 Aug 2001 | Last revised: 30 May 2002

Overview

Versions of OpenSSH client prior to 2.3.0 do not properly enforce restrictions to the ssh-agent or X11 display.

Description

An OpenSSH client can be configured to prevent servers from accessing the client's ssh-agent or X11 display. However, versions of OpenSSH client prior to 2.3.0 fail to enforce these settings and thus allow access regardless of the client's desired configuration.

The ssh-agent program is a tool used to store private keys for subsequent use by programs started in the same session. When an SSH connection is established, the client and server negotiate whether or not the server may have access to the client's local ssh-agent (and consequently, the client's stored authentication material). The ForwardAgent setting specifies whether access to the client's ssh-agent is permitted. However, if a server requests access to the local ssh-agent after the connection is negotiated, versions of the OpenSSH client prior to 2.3.0 will permit it even if ForwardAgent is set to "no."

A similar problem exists in the implementation of X11 forwarding in the same versions of the OpenSSH client.

Impact

Malicious servers can gain access to your X11 display or key material cached with ssh-agent.

Solution

Upgrade to OpenSSH 2.3.0 or later, or apply the patch for this issue available at http://www.openssh.com.

Clear both the $DISPLAY and the $SSH_AUTH_SOCK variable before connecting to untrusted hosts.
% unset SSH_AUTH_SOCK; unset DISPLAY; ssh host

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
OpenSSHAffected-25 Jun 2001
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

Thanks to Jacob Langseth <jwl@pobox.com> for pointing out the X11 forwarding issue and to Markus Friedl who published an advisory on this topic.

This document was written by Shawn Hernan and Shawn Van Ittersum.

Other Information

  • CVE IDs: CVE-2000-1169
  • Date Public: 07 Dec 2000
  • Date First Published: 13 Aug 2001
  • Date Last Updated: 30 May 2002
  • Severity Metric: 0.98
  • Document Revision: 16

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.