Описание
Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 1:6.9p1-1 |
esm-infra-legacy/trusty | released | 1:6.6p1-2ubuntu2.2 |
precise | released | 1:5.9p1-5ubuntu1.6 |
trusty | released | 1:6.6p1-2ubuntu2.2 |
trusty/esm | released | 1:6.6p1-2ubuntu2.2 |
upstream | released | 1:6.9p1-1 |
vivid | released | 1:6.7p1-5ubuntu1.2 |
Показывать по
Ссылки на источники
EPSS
6.9 Medium
CVSS2
Связанные уязвимости
Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
Use-after-free vulnerability in the mm_answer_pam_free_ctx function in ...
Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
Уязвимость функции mm_answer_pam_free_ctx средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код или остановить службу sshd
EPSS
6.9 Medium
CVSS2