Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-4548

Опубликовано: 08 нояб. 2013
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS2: 6

Описание

The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH 6.2 and 6.3, when an AES-GCM cipher is used, does not properly initialize memory for a MAC context data structure, which allows remote authenticated users to bypass intended ForceCommand and login-shell restrictions via packet data that provides a crafted callback address.

РелизСтатусПримечание
devel

released

1:6.2p2-6ubuntu1
lucid

not-affected

1:5.3p1-3ubuntu7
precise

not-affected

1:5.9p1-5ubuntu1.1
quantal

not-affected

1:6.0p1-3ubuntu1
raring

not-affected

1:6.1p1-4
saucy

released

1:6.2p2-6ubuntu0.1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 54%
0.00313
Низкий

6 Medium

CVSS2

Связанные уязвимости

redhat
больше 12 лет назад

The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH 6.2 and 6.3, when an AES-GCM cipher is used, does not properly initialize memory for a MAC context data structure, which allows remote authenticated users to bypass intended ForceCommand and login-shell restrictions via packet data that provides a crafted callback address.

nvd
около 12 лет назад

The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH 6.2 and 6.3, when an AES-GCM cipher is used, does not properly initialize memory for a MAC context data structure, which allows remote authenticated users to bypass intended ForceCommand and login-shell restrictions via packet data that provides a crafted callback address.

debian
около 12 лет назад

The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH ...

github
больше 3 лет назад

The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH 6.2 and 6.3, when an AES-GCM cipher is used, does not properly initialize memory for a MAC context data structure, which allows remote authenticated users to bypass intended ForceCommand and login-shell restrictions via packet data that provides a crafted callback address.

fstec
около 11 лет назад

Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 54%
0.00313
Низкий

6 Medium

CVSS2