Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-10010

Опубликовано: 05 янв. 2017
Источник: debian
EPSS Низкий

Описание

sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
opensshfixed1:7.4p1-1package

Примечания

  • Fixed in upstream 7.4: https://www.openssh.com/txt/release-7.4

  • http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/serverloop.c.diff?r1=1.188&r2=1.189

  • Privilege separation is enabled in the Debian package

EPSS

Процентиль: 35%
0.00142
Низкий

Связанные уязвимости

CVSS3: 7
ubuntu
около 9 лет назад

sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.

CVSS3: 7.5
redhat
около 9 лет назад

sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.

CVSS3: 7
nvd
около 9 лет назад

sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.

CVSS3: 7
github
больше 3 лет назад

sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.

fstec
около 9 лет назад

Уязвимость средства криптографической защиты OpenSSH, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 35%
0.00142
Низкий