Executive Summary
Summary | |
---|---|
Title | OpenSSH UseLogin vulnerability |
Informations | |||
---|---|---|---|
Name | DSA-091 | First vendor Publication | 2001-12-05 |
Vendor | Debian | Last vendor Modification | 2001-12-05 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
If the UseLogin feature is enabled in for ssh local users could pass environment variables (including variables like LD_PRELOAD) to the login process. This has been fixed by not copying the environment of UseLogin is enabled. Please note that the default configuration for Debian does not have the UseLogin enabled. This has been fixed in version 1:1.2.3-9.4. wget url will fetch the file for you dpkg -i file.deb will install the referenced file. Debian GNU/Linux 2.2 alias potato |
Original Source
Url : http://www.debian.org/security/2001/dsa-091 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 091-1 (ssh) File : nvt/deb_091_1.nasl |
2005-11-03 | Name : OpenSSH UseLogin Environment Variables File : nvt/openssh_uselogin_environment.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
688 | OpenSSH UseLogin Environment Variable Local Command Execution OpenSSH contains a flaw that may allow a malicious local attacker to execute arbitrary code on the system. The issue is triggered by a vulnerability in the UseLogin configuration option. If the UseLogin option is enabled, a local attacker can set the LD_PRELOAD or LD_LIBRARY_PATH environment variable to point to a maliciously created shared library file, which would be executed with superuser privileges when the login program is executed. This flaw may lead to a loss of Confidentiality, Integrity, and/or Availability. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2011-08-29 | Name : The SSH service running on the remote host has an information disclosure vuln... File : sunssh_plaintext_recovery.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-091.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2001-092.nasl - Type : ACT_GATHER_INFO |
2001-12-10 | Name : The SSH service running on the remote host has multiple vulnerabilities. File : openssh_uselogin_environment.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:25:30 |
|