Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-3115

Опубликовано: 22 мар. 2016
Источник: ubuntu
Приоритет: low
EPSS Средний
CVSS2: 5.5
CVSS3: 6.4

Описание

Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.

РелизСтатусПримечание
devel

not-affected

1:7.2p2-5
esm-infra-legacy/trusty

released

1:6.6p1-2ubuntu2.7
esm-infra/xenial

not-affected

1:7.2p2-4
precise

released

1:5.9p1-5ubuntu1.9
precise/esm

not-affected

1:5.9p1-5ubuntu1.9
trusty

released

1:6.6p1-2ubuntu2.7
trusty/esm

released

1:6.6p1-2ubuntu2.7
upstream

released

7.2p2
vivid/stable-phone-overlay

ignored

end of life
vivid/ubuntu-core

ignored

end of life

Показывать по

EPSS

Процентиль: 98%
0.48342
Средний

5.5 Medium

CVSS2

6.4 Medium

CVSS3

Связанные уязвимости

redhat
почти 10 лет назад

Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.

CVSS3: 6.4
nvd
почти 10 лет назад

Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.

CVSS3: 6.4
debian
почти 10 лет назад

Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSS ...

CVSS3: 6.4
github
больше 3 лет назад

Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.

fstec
почти 10 лет назад

Уязвимости средства криптографической защиты OpenSSH, позволяющие нарушителю обойти ограничения интерпретатора команд

EPSS

Процентиль: 98%
0.48342
Средний

5.5 Medium

CVSS2

6.4 Medium

CVSS3