Lucene search

K
nessusTenable1989.PRM
HistoryAug 20, 2004 - 12:00 a.m.

OpenSSH < 3.2.1 AFS/Kerberos Ticket/Token Passing Overflow

2004-08-2000:00:00
Tenable
www.tenable.com
5

The remote host is running a version of OpenSSH older than OpenSSH 3.2.1. A buffer overflow exists in the daemon if AFS is enabled on your system, or if the options KerberosTgtPassing or AFSTokenPassing are enabled. Even in this scenario, the vulnerability may be avoided by enabling UsePrivilegeSeparation. Versions prior to 2.9.9 are vulnerable to a remote root exploit. Versions prior to 3.2.1 are vulnerable to a local root exploit.

Note: NNM has solely relied on the banner of the SSH client to perform this check. Any backported patches or workarounds such as recompiling or edited configurations are not observable through the banner.

Binary data 1989.prm
VendorProductVersionCPE
openbsdopensshcpe:/a:openbsd:openssh