{"vuid":"VU#316888","idnumber":"316888","name":"MobaXterm server may allow arbitrary command injection due to missing X11 authentication","keywords":["x11","CWE-306"],"overview":"The MobaXterm server prior to verion 8.3 is vulnerable to arbitrary command injection over port 6000 when using default X11 settings.","clean_desc":"CWE-306: Missing Authentication for Critical Function - CVE-2015-7244 MobaXterm server prior to version 8.3 includes an X11 server listening on all IP addresses which does not authenticate remote X11 connections over port 6000. A remote attacker may silently connect to the server, and view and inject X11 commands with the privileges of the user currently using MobaXterm.","impact":"An unauthenticated remote attacker may view and inject X11 commands with the privileges of the user currently using MobaXterm.","resolution":"Apply an update Mobatek has released MobaXterm 8.3 which addresses this issue by notifying users of incoming connection attempts and allows the user to accept or decline. Affected users are encouraged to update as soon as possible.","workarounds":"","sysaffected":"","thanks":"Thanks to Bryan Rhodes, Ryan Wincey, Micheal Reski, and Dan Mason for reporting this vulnerability.","author":"This document was written by Garret Wassermann.","public":["http://mobaxterm.mobatek.net/download-home-edition.html","http://www.securifera.com/advisories/cve-2015-7244"],"cveids":["CVE-2015-7244"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2015-09-21T17:14:32Z","publicdate":"2015-10-31T00:00:00Z","datefirstpublished":"2015-11-02T21:21:07Z","dateupdated":"2015-11-02T21:47:01Z","revision":27,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"7.5","cvss_basevector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","cvss_temporalscore":"5.9","cvss_environmentalscore":"4.39536605221744","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}