[Forgot Password]
Login  Register Subscribe

23631

 
 

115083

 
 

97147

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2012-0814

Date: (C)2012-01-27   (M)2017-08-29
 
CVSS Score: 3.5Access Vector: NETWORK
Exploitability Subscore: 6.8Access Complexity: MEDIUM
Impact Subscore: 2.9Authentication: SINGLE_INSTANCE
 Confidentiality: PARTIAL
 Integrity: NONE
 Availability: NONE











The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.

Reference:
BID-51702
OSVDB-78706
http://openwall.com/lists/oss-security/2012/01/26/15
http://openwall.com/lists/oss-security/2012/01/27/1
http://openwall.com/lists/oss-security/2012/01/27/4
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657445
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c.diff?r1=1.53;r2=1.54
opensshserver-commands-info-disc(72756)

CPE    78
cpe:/a:openbsd:openssh:2
cpe:/a:openbsd:openssh:1.3
cpe:/a:openbsd:openssh:1.5
cpe:/a:openbsd:openssh:1.5.8
...
CWE    1
CWE-255
OVAL    1
oval:org.secpod.oval:def:1300168

© 2013 SecPod Technologies