Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-6563

Опубликовано: 24 авг. 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 1.9

Описание

The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.

РелизСтатусПримечание
devel

not-affected

1:6.9p1-1
esm-infra-legacy/trusty

released

1:6.6p1-2ubuntu2.2
precise

released

1:5.9p1-5ubuntu1.6
trusty

released

1:6.6p1-2ubuntu2.2
trusty/esm

released

1:6.6p1-2ubuntu2.2
upstream

released

1:6.9p1-1
vivid

released

1:6.7p1-5ubuntu1.2

Показывать по

EPSS

Процентиль: 27%
0.0009
Низкий

1.9 Low

CVSS2

Связанные уязвимости

redhat
около 10 лет назад

The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.

nvd
около 10 лет назад

The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.

debian
около 10 лет назад

The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD pla ...

github
больше 3 лет назад

The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.

CVSS3: 7.4
fstec
около 10 лет назад

Уязвимость средства криптографической защиты OpenSSH, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю выполнить произвольный код или остановить службу sshd

EPSS

Процентиль: 27%
0.0009
Низкий

1.9 Low

CVSS2