Информационная безопасность
[RU] switch to English


CVECVE-2015-6563
СтатусCandidate
ОписаниеThe monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
Важность
Low
CVSS score1,9
CVSS vector(AV:L/AC:M/Au:N/C:N/I:P/A:N)
PhaseAssigned (21.08.2015)
NVD:http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6563
ReferencesFULLDISC : 20150813 BFS-SA-2015-002: OpenSSH PAM Privilege Separation Vulnerabilities
 APPLE : APPLE-SA-2015-10-21-4
 CONFIRM : http://www.openssh.com/txt/release-7.0
 CONFIRM : https://github.com/openssh/openssh-portable/commit...
 CONFIRM : https://support.apple.com/HT205375
 MLIST : [oss-security] 20150821 Re: CVE request - OpenSSH 6.9 PAM privilege separation vulnerabilities
SecurityVulns:Многочисленные уязвимости безопасности в Apple Mac OS X / Mac EFI / OS X Server
О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород