{"id":"DEBIAN-CVE-2007-4752","details":"ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.","modified":"2026-04-28T20:09:45.752926Z","published":"2007-09-12T01:17:00Z","upstream":["CVE-2007-4752"],"references":[{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2007-4752"}],"affected":[{"package":{"name":"openssh","ecosystem":"Debian:11","purl":"pkg:deb/debian/openssh?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:4.7p1-1"}]}],"ecosystem_specific":{"urgency":"low"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2007-4752.json"}},{"package":{"name":"openssh","ecosystem":"Debian:12","purl":"pkg:deb/debian/openssh?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:4.7p1-1"}]}],"ecosystem_specific":{"urgency":"low"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2007-4752.json"}},{"package":{"name":"openssh","ecosystem":"Debian:13","purl":"pkg:deb/debian/openssh?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:4.7p1-1"}]}],"ecosystem_specific":{"urgency":"low"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2007-4752.json"}},{"package":{"name":"openssh","ecosystem":"Debian:14","purl":"pkg:deb/debian/openssh?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:4.7p1-1"}]}],"ecosystem_specific":{"urgency":"low"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2007-4752.json"}}],"schema_version":"1.7.5"}