Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-9278

Опубликовано: 06 дек. 2014
Источник: debian
EPSS Низкий

Описание

The OpenSSH server, as used in Fedora and Red Hat Enterprise Linux 7 and when running in a Kerberos environment, allows remote authenticated users to log in as another user when they are listed in the .k5users file of that user, which might bypass intended authentication requirements that would force a local login.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
opensshnot-affectedpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1169843

  • Patch https://bugzilla.mindrot.org/show_bug.cgi?id=1867 from not applied in Debian

EPSS

Процентиль: 57%
0.00351
Низкий

Связанные уязвимости

ubuntu
больше 10 лет назад

The OpenSSH server, as used in Fedora and Red Hat Enterprise Linux 7 and when running in a Kerberos environment, allows remote authenticated users to log in as another user when they are listed in the .k5users file of that user, which might bypass intended authentication requirements that would force a local login.

redhat
почти 11 лет назад

The OpenSSH server, as used in Fedora and Red Hat Enterprise Linux 7 and when running in a Kerberos environment, allows remote authenticated users to log in as another user when they are listed in the .k5users file of that user, which might bypass intended authentication requirements that would force a local login.

nvd
больше 10 лет назад

The OpenSSH server, as used in Fedora and Red Hat Enterprise Linux 7 and when running in a Kerberos environment, allows remote authenticated users to log in as another user when they are listed in the .k5users file of that user, which might bypass intended authentication requirements that would force a local login.

github
больше 3 лет назад

The OpenSSH server, as used in Fedora and Red Hat Enterprise Linux 7 and when running in a Kerberos environment, allows remote authenticated users to log in as another user when they are listed in the .k5users file of that user, which might bypass intended authentication requirements that would force a local login.

oracle-oval
больше 10 лет назад

ELSA-2015-0425: openssh security, bug fix and enhancement update (MODERATE)

EPSS

Процентиль: 57%
0.00351
Низкий