[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

114563

 
 

909

 
 

88860

 
 

136

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2012-0814Date: (C)2012-01-27   (M)2018-04-15


The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 3.5
Exploit Score: 6.8
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: SINGLE_INSTANCE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
BID-51702
OSVDB-78706
http://openwall.com/lists/oss-security/2012/01/26/15
http://openwall.com/lists/oss-security/2012/01/27/1
http://openwall.com/lists/oss-security/2012/01/27/4
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657445
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c.diff?r1=1.53;r2=1.54
opensshserver-commands-info-disc(72756)

CPE    78
cpe:/a:openbsd:openssh:1.2.3
cpe:/a:openbsd:openssh:1.2.2
cpe:/a:openbsd:openssh:1.2.1
cpe:/a:openbsd:openssh:3.7.1p1
...
CWE    1
CWE-255
OVAL    1
oval:org.secpod.oval:def:1300168

© SecPod Technologies