000032302 - OpenSSH "X SECURITY" Bypass Vulnerability (CVE-2015-5352) in RSA Security Analytics - False Positive

Document created by RSA Customer Support Employee on Jun 14, 2016Last modified by RSA Customer Support Employee on Apr 14, 2017
Version 2Show Document
  • View in full screen mode

Article Content

Article Number000032302
Applies ToRSA Product Set: Security Analytics
RSA Product/Service Type: Core Appliance
RSA Version/Condition: 10.5.x
CVE IDCVE-2015-5352
Article SummaryThe appliances do not contain Xauth extensions installed, Therefore, all X11Forwarding requests will fail with a message the message below.
X11Forwarding request failed on channel n
Link to Advisorieshttps://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5352
Alert ImpactNot Exploitable
Technical DetailsThe flaw exists but it is not exploitable
Technical Details ExplanationThe appliances are not vulnerable to this vulnerability.
ResolutionThis vulnerability can be addressed by either by upgrading openssh version to 6.9 or by disabling X11forwarding in the sshd_config file on the appliance.
An upgrade of the openssh version to 6.9 will also be included in the Security Analytics 10.5.2 upgrade.
Follow the steps below to disable the X11Forwarding.
  1. Connect to the appliance via SSH as the root user.
  2. Issue the command below to edit the sshd_config file.
    vi /etc/ssh/ssdh_config

  3. Press i to edit the file and locate word "X11Forwarding" and modify the X11Forwarding line to appear as below.
    X11Forwarding no

  4. Press "ESC" and type ":wq!" to save and exit the file.
  5. Restart ssh service with the command below.
    service sshd restart



Read and use the information in this RSA Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact RSA Software Technical Support at 1- 800 995 5095. RSA Security LLC and its affiliates, including without limitation, its ultimate parent company, EMC Corporation, distributes RSA Security Advisories in order to bring to the attention of users of the affected RSA products, important security information. RSA recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided 'as is' without warranty of any kind. RSA disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall RSA, its affiliates or suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if RSA, its affiliates or suppliers have been advised of the possibility of such damages. Some jurisdictions do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.