The x11openhelper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "openssh-client", "binary_version": "1:6.6p1-2ubuntu2.2" }, { "binary_name": "openssh-client-dbgsym", "binary_version": "1:6.6p1-2ubuntu2.2" }, { "binary_name": "openssh-client-udeb", "binary_version": "1:6.6p1-2ubuntu2.2" }, { "binary_name": "openssh-client-udeb-dbgsym", "binary_version": "1:6.6p1-2ubuntu2.2" }, { "binary_name": "openssh-server", "binary_version": "1:6.6p1-2ubuntu2.2" }, { "binary_name": "openssh-server-dbgsym", "binary_version": "1:6.6p1-2ubuntu2.2" }, { "binary_name": "openssh-server-udeb", "binary_version": "1:6.6p1-2ubuntu2.2" }, { "binary_name": "openssh-server-udeb-dbgsym", "binary_version": "1:6.6p1-2ubuntu2.2" }, { "binary_name": "openssh-sftp-server", "binary_version": "1:6.6p1-2ubuntu2.2" }, { "binary_name": "openssh-sftp-server-dbgsym", "binary_version": "1:6.6p1-2ubuntu2.2" }, { "binary_name": "ssh", "binary_version": "1:6.6p1-2ubuntu2.2" }, { "binary_name": "ssh-askpass-gnome", "binary_version": "1:6.6p1-2ubuntu2.2" }, { "binary_name": "ssh-askpass-gnome-dbgsym", "binary_version": "1:6.6p1-2ubuntu2.2" }, { "binary_name": "ssh-krb5", "binary_version": "1:6.6p1-2ubuntu2.2" } ] }