CVE-2015-6563 | Date: (C)2015-08-25 (M)2024-02-22 |
The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
CVSS Score and Metrics +CVSS Score and Metrics -CVSS V2 Severity: |
CVSS Score : 1.9 |
Exploit Score: 3.4 |
Impact Score: 2.9 |
|
CVSS V2 Metrics: |
Access Vector: LOCAL |
Access Complexity: MEDIUM |
Authentication: NONE |
Confidentiality: NONE |
Integrity: PARTIAL |
Availability: NONE |
| |