Lucene search

K
freebsdFreeBSDADCCEFD1-7080-11E6-A2CB-C80AA9043978
HistoryAug 01, 2016 - 12:00 a.m.

openssh -- sshd -- remote valid user discovery and PAM /bin/login attack

2016-08-0100:00:00
vuxml.freebsd.org
43

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.107 Low

EPSS

Percentile

95.0%

The OpenSSH project reports:

  • sshd(8): Mitigate timing differences in password authentication
    that could be used to discern valid from invalid account names
    when long passwords were sent and particular password hashing
    algorithms are in use on the server. CVE-2016-6210, reported by
    EddieEzra.Harari at verint.com

  • sshd(8): (portable only) Ignore PAM environment vars when
    UseLogin=yes. If PAM is configured to read user-specified
    environment variables and UseLogin=yes in sshd_config, then a
    hostile local user may attack /bin/login via LD_PRELOAD or
    similar environment variables set via PAM. CVE-2015-8325,
    found by Shayan Sadigh.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchopenssh-portable< 7.3.p1,1UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.107 Low

EPSS

Percentile

95.0%