Lucene search

K
nessusTenable8169.PRM
HistoryMar 24, 2014 - 12:00 a.m.

OpenSSH < 6.6 Multiple Remote Restriction Bypass Vulnerability

2014-03-2400:00:00
Tenable
www.tenable.com
49

Versions of OpenSSH server before 6.6 are unpatched for multiple restriction bypass vulnerabilities:

  • A vulnerability exists related to wildcard usage in the ‘AcceptEnv’ configuration setting within sshd_config. This could be leveraged by an attacker to bypass environment restrictions via a specially crafted request.

Note: NNM has solely relied on the banner of the SSH client to perform this check. Any backported patches or workarounds such as recompiling or edited configurations are not observable through the banner. (CVE-2014-2532)

  • The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition. (CVE-2014-1692)
Binary data 8169.prm
VendorProductVersionCPE
openbsdopensshcpe:/a:openbsd:openssh