Lucene search

K
cve[email protected]CVE-2015-6563
HistoryAug 24, 2015 - 1:59 a.m.

CVE-2015-6563

2015-08-2401:59:00
CWE-20
web.nvd.nist.gov
1391
2
cve-2015-6563
openssh
monitor component
sshd
impersonation attacks
nvd

CVSS2

1.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:M/Au:N/C:N/I:P/A:N

AI Score

5.4

Confidence

Low

EPSS

0

Percentile

10.1%

The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.

Affected configurations

NVD
Node
openbsdopensshRange6.9
Node
applemac_os_xRange10.11.0
VendorProductVersionCPE
openbsdopensshcpe:/a:openbsd:openssh::::

References

Social References

More

CVSS2

1.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:M/Au:N/C:N/I:P/A:N

AI Score

5.4

Confidence

Low

EPSS

0

Percentile

10.1%