Executive Summary

Summary
Title MobaXterm server may allow arbitrary command injection due to missing X11 authentication
Informations
Name VU#316888 First vendor Publication 2015-11-02
Vendor VU-CERT Last vendor Modification 2015-11-02
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#316888

MobaXterm server may allow arbitrary command injection due to missing X11 authentication

Original Release date: 02 Nov 2015 | Last revised: 02 Nov 2015

Overview

The MobaXterm server prior to verion 8.3 is vulnerable to arbitrary command injection over port 6000 when using default X11 settings.

Description

CWE-306: Missing Authentication for Critical Function - CVE-2015-7244

MobaXterm server prior to version 8.3 includes an X11 server listening on all IP addresses which does not authenticate remote X11 connections over port 6000. A remote attacker may silently connect to the server, and view and inject X11 commands with the privileges of the user currently using MobaXterm.

Impact

An unauthenticated remote attacker may view and inject X11 commands with the privileges of the user currently using MobaXterm.

Solution

Apply an update

Mobatek has released MobaXterm 8.3 which addresses this issue by notifying users of incoming connection attempts and allows the user to accept or decline. Affected users are encouraged to update as soon as possible.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
MobatekAffected30 Sep 201516 Oct 2015
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base7.5AV:N/AC:L/Au:N/C:P/I:P/A:P
Temporal5.9E:POC/RL:OF/RC:C
Environmental4.4CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

  • http://mobaxterm.mobatek.net/download-home-edition.html
  • http://www.securifera.com/advisories/cve-2015-7244

Credit

Thanks to Bryan Rhodes, Ryan Wincey, Micheal Reski, and Dan Mason for reporting this vulnerability.

This document was written by Garret Wassermann.

Other Information

  • CVE IDs:CVE-2015-7244
  • Date Public:31 Oct 2015
  • Date First Published:02 Nov 2015
  • Date Last Updated:02 Nov 2015
  • Document Revision:26

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/316888

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-284 Access Control (Authorization) Issues

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2015-11-05 00:26:22
  • Multiple Updates
2015-11-04 09:27:23
  • Multiple Updates
2015-11-03 00:21:21
  • First insertion