Lucene search

K
freebsdFreeBSD2920C449-4850-11E5-825F-C80AA9043978
HistoryAug 11, 2015 - 12:00 a.m.

OpenSSH -- PAM vulnerabilities

2015-08-1100:00:00
vuxml.freebsd.org
31

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

25.5%

OpenSSH 6.8 and 6.9 incorrectly set TTYs to be world-writable.
Local attackers may be able to write arbitrary messages to
logged-in users, including terminal escape sequences. Reported
by Nikolay Edigaryev.
Fixed a privilege separation
weakness related to PAM support. Attackers who could successfully
compromise the pre-authentication process for remote code
execution and who had valid credentials on the host could
impersonate other users.
Fixed a use-after-free bug
related to PAM support that was reachable by attackers who could
compromise the pre-authentication process for remote code
execution.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchopenssh-portable< 7.0.p1,1UNKNOWN
FreeBSDanynoarchfreebsd= 10.2UNKNOWN
FreeBSDanynoarchfreebsd< 10.2_2UNKNOWN

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

25.5%