CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
75.9%
sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
Vendor | Product | Version | CPE |
---|---|---|---|
oracle | communications_user_data_repository | 10.0.1 | cpe:2.3:a:oracle:communications_user_data_repository:10.0.1:*:*:*:*:*:*:* |
openbsd | openssh | * | cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:* |
openbsd | openssh | 6.0 | cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:* |
openbsd | openssh | 6.1 | cpe:2.3:a:openbsd:openssh:6.1:*:*:*:*:*:*:* |
openbsd | openssh | 6.2 | cpe:2.3:a:openbsd:openssh:6.2:*:*:*:*:*:*:* |
openbsd | openssh | 6.3 | cpe:2.3:a:openbsd:openssh:6.3:*:*:*:*:*:*:* |
openbsd | openssh | 6.4 | cpe:2.3:a:openbsd:openssh:6.4:*:*:*:*:*:*:* |
advisories.mageia.org/MGASA-2014-0143.html
aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc
lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html
lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html
marc.info/?l=bugtraq&m=141576985122836&w=2
marc.info/?l=openbsd-security-announce&m=139492048027313&w=2
rhn.redhat.com/errata/RHSA-2014-1552.html
secunia.com/advisories/57488
secunia.com/advisories/57574
secunia.com/advisories/59313
secunia.com/advisories/59855
www.debian.org/security/2014/dsa-2894
www.mandriva.com/security/advisories?name=MDVSA-2014:068
www.mandriva.com/security/advisories?name=MDVSA-2015:095
www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
www.securityfocus.com/bid/66355
www.securitytracker.com/id/1029925
www.ubuntu.com/usn/USN-2155-1
exchange.xforce.ibmcloud.com/vulnerabilities/91986
support.apple.com/HT205267
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
75.9%