Wind River Support Network

HomeOther DownloadsSecurity Advisory - OpenSSH - CVE-2008-3259
Recommended Type: Patch

Security Advisory - OpenSSH - CVE-2008-3259

Released: Aug 28, 2008     Updated: Aug 28, 2008

Description

OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform. IDENTIFIER = WIND00129871


Product Version

Linux Platforms 2.0, Linux Platforms 1.x

Downloads


Installation Notes

Installation Notes

WIND00129881.zip for 1.4
WIND00129882.zip for 1.5
WIND00129883.zip for 2.0

1. Unzip the patch under [install_dir]/updates

2. Install the patch CD by entering the patch CD directory and run setup_linux.

3. This is a source only patch so you will have to build the kernel

4. Issue a make fs and make the kernel in a configured directory.

5. Upload the kernel and rootfs into the target and boot it up.


Live chat
Online