7 High
AI Score
Confidence
Low
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.002 Low
EPSS
Percentile
58.0%
When OpenSSH is used in an environment using PAM, it may be
possible for local users to evade restrictions enforced by PAM modules (such as rlimits).
A PAM session is not initiated by OpenSSH when commands are executed in an
# Copyright (C) 2021 Greenbone Networks GmbH
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
CPE = "cpe:/a:openbsd:openssh";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.150646");
script_version("2022-04-12T08:46:17+0000");
script_tag(name:"last_modification", value:"2022-04-12 08:46:17 +0000 (Tue, 12 Apr 2022)");
script_tag(name:"creation_date", value:"2021-05-27 14:42:43 +0000 (Thu, 27 May 2021)");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_cve_id("CVE-2001-0529", "CVE-2001-1459");
script_tag(name:"qod_type", value:"remote_banner_unreliable");
script_tag(name:"solution_type", value:"VendorFix");
script_name("OpenSSH <= 2.9 Security Vulnerability");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2021 Greenbone Networks GmbH");
script_family("General");
script_dependencies("gb_openssh_consolidation.nasl");
script_mandatory_keys("openssh/detected");
script_tag(name:"summary", value:"When OpenSSH is used in an environment using PAM, it may be
possible for local users to evade restrictions enforced by PAM modules (such as rlimits).
A PAM session is not initiated by OpenSSH when commands are executed in an 'rsh' manner (no pty).
Some systems may rely on PAM to implement system restrictions, such as resource limits on processes.
This vulnerability may allow remote users to bypass these restrictions.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"Please see the references for more information on the vulnerabilities.");
script_tag(name:"affected", value:"OpenSSH version 2.9 and prior.");
script_tag(name:"solution", value:"Update to version 2.9.1 or later.");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/2917");
exit(0);
}
include("version_func.inc");
include("host_details.inc");
if( isnull( port = get_app_port( cpe:CPE ) ) )
exit( 0 );
if( ! infos = get_app_version_and_location( cpe:CPE, port:port, exit_no_version:TRUE ) )
exit( 0 );
vers = infos["version"];
path = infos["location"];
if( version_is_less_equal( version:vers, test_version:"2.9" ) ) {
report = report_fixed_ver( installed_version:vers, fixed_version:"2.9.1", install_path:path );
security_message( port:port, data:report );
exit( 0 );
}
exit( 99 );