Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2001-0872 | First vendor Publication | 2001-12-21 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
OpenSSH 3.0.1 and earlier with UseLogin enabled does not properly cleanse critical environment variables such as LD_PRELOAD, which allows local users to gain root privileges. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0872 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 091-1 (ssh) File : nvt/deb_091_1.nasl |
2005-11-03 | Name : OpenSSH UseLogin Environment Variables File : nvt/openssh_uselogin_environment.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
688 | OpenSSH UseLogin Environment Variable Local Command Execution OpenSSH contains a flaw that may allow a malicious local attacker to execute arbitrary code on the system. The issue is triggered by a vulnerability in the UseLogin configuration option. If the UseLogin option is enabled, a local attacker can set the LD_PRELOAD or LD_LIBRARY_PATH environment variable to point to a maliciously created shared library file, which would be executed with superuser privileges when the login program is executed. This flaw may lead to a loss of Confidentiality, Integrity, and/or Availability. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2011-08-29 | Name : The SSH service running on the remote host has an information disclosure vuln... File : sunssh_plaintext_recovery.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-091.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2001-092.nasl - Type : ACT_GATHER_INFO |
2001-12-10 | Name : The SSH service running on the remote host has multiple vulnerabilities. File : openssh_uselogin_environment.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:24:04 |
|
2024-11-28 12:04:41 |
|
2024-08-03 01:01:45 |
|
2024-08-02 12:01:57 |
|
2024-08-02 01:01:16 |
|
2024-02-02 12:01:53 |
|
2024-02-02 01:01:46 |
|
2024-02-01 12:01:17 |
|
2023-09-06 01:01:35 |
|
2023-09-05 12:01:41 |
|
2023-09-05 01:01:08 |
|
2023-09-03 01:01:42 |
|
2023-09-02 12:01:43 |
|
2023-09-02 01:01:09 |
|
2023-08-13 01:01:36 |
|
2023-08-12 12:02:03 |
|
2023-08-12 01:01:09 |
|
2023-08-11 12:01:46 |
|
2023-08-11 01:01:10 |
|
2023-08-07 01:01:34 |
|
2023-08-06 12:01:38 |
|
2023-08-06 01:01:10 |
|
2023-08-05 01:01:34 |
|
2023-08-04 12:01:42 |
|
2023-08-04 01:01:09 |
|
2023-07-15 01:01:51 |
|
2023-07-14 12:01:40 |
|
2023-07-14 01:01:10 |
|
2023-03-29 12:01:48 |
|
2023-03-29 01:01:38 |
|
2023-03-28 12:01:15 |
|
2022-10-12 01:01:29 |
|
2022-10-11 12:01:29 |
|
2022-10-11 01:01:02 |
|
2022-08-06 12:01:45 |
|
2022-08-05 12:01:39 |
|
2021-05-04 12:01:27 |
|
2021-04-22 01:01:36 |
|
2020-07-25 12:01:01 |
|
2020-05-23 01:35:37 |
|
2020-05-23 00:14:43 |
|
2019-10-09 01:01:05 |
|
2018-05-03 09:19:24 |
|
2016-10-18 12:00:56 |
|
2016-06-28 14:56:56 |
|
2016-04-27 09:21:03 |
|
2014-02-17 10:24:01 |
|
2013-05-11 12:05:34 |
|