10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.002 Low
EPSS
Percentile
56.4%
Versions of OpenSSH prior to 2.1.1 (current circa June, 2000) allow a remote attacker to execute arbitrary commands with the privileges of sshd, typically root.
OpenSSH is a free implementation of versions 1 and 2 of the SSH protocol. If sshd is configured with the UseLogin option, it attempts to use login(1) to authenticate the user. However, is ssh is used to execute a command, the command is run with the privileges of sshd, typically root. UseLogin is not enabled by default.
Remote attackers can run arbitrary commands as root on systems with UseLogin enabled.
Upgrade to the latest version of OpenSSH.
40327
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: November 05, 2001
Affected
See <http://www.openbsd.org/errata27.html#uselogin>
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%2340327 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Our thanks to Markus Friedl who reported this information.
This document was written by Shawn V Hernan.
CVE IDs: | CVE-2000-0525 |
---|---|
Severity Metric: | 31.50 Date Public: |
www.ciac.org/ciac/bulletins/k-058.shtml
www.openbsd.org/errata27.html#uselogin
www.securiteam.com/unixfocus/5MQ070A1QU.html
www.securityfocus.com/bid/1334
www.securityfocus.com/templates/archive.pike?list=1&date=2000-06-8&[email protected]
xforce.iss.net/alerts/vol-5_num-6.php#-openssh-uselogin-remote-exec