CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
76.3%
OpenSSH 4.4 up to versions before 4.9 allows remote authenticated users to bypass the sshd_config ForceCommand directive by modifying the .ssh/rc session file.
Vendor | Product | Version | CPE |
---|---|---|---|
openbsd | openssh | 4.4 | cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:* |
openbsd | openssh | 4.4p1 | cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:* |
openbsd | openssh | 4.5 | cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:* |
openbsd | openssh | 4.6 | cpe:2.3:a:openbsd:openssh:4.6:*:*:*:*:*:*:* |
openbsd | openssh | 4.7 | cpe:2.3:a:openbsd:openssh:4.7:*:*:*:*:*:*:* |
openbsd | openssh | 4.8 | cpe:2.3:a:openbsd:openssh:4.8:*:*:*:*:*:*:* |
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-005.txt.asc
aix.software.ibm.com/aix/efixes/security/ssh_advisory.asc
lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
lists.opensuse.org/opensuse-security-announce/2008-04/msg00007.html
secunia.com/advisories/29602
secunia.com/advisories/29609
secunia.com/advisories/29683
secunia.com/advisories/29693
secunia.com/advisories/29735
secunia.com/advisories/29939
secunia.com/advisories/30361
secunia.com/advisories/31531
secunia.com/advisories/31882
secunia.com/advisories/32080
secunia.com/advisories/32110
support.attachmate.com/techdocs/2374.html
wiki.rpath.com/wiki/Advisories:rPSA-2008-0139
www.gentoo.org/security/en/glsa/glsa-200804-03.xml
www.mandriva.com/security/advisories?name=MDVSA-2008:098
www.openbsd.org/errata43.html#001_openssh
www.openssh.com/txt/release-4.9
www.securityfocus.com/archive/1/490488/100/0/threaded
www.securityfocus.com/bid/28531
www.securitytracker.com/id?1019733
www.ubuntu.com/usn/usn-649-1
www.us-cert.gov/cas/techalerts/TA08-260A.html
www.vupen.com/english/advisories/2008/1035/references
www.vupen.com/english/advisories/2008/1624/references
www.vupen.com/english/advisories/2008/2396
www.vupen.com/english/advisories/2008/2584
exchange.xforce.ibmcloud.com/vulnerabilities/41549
issues.rpath.com/browse/RPL-2419