Vulnerability CVE-2009-2904


Published: 2009-10-01   Modified: 2012-02-13

Description:
A certain Red Hat modification to the ChrootDirectory feature in OpenSSH 4.8, as used in sshd in OpenSSH 4.3 in Red Hat Enterprise Linux (RHEL) 5.4 and Fedora 11, allows local users to gain privileges via hard links to setuid programs that use configuration files within the chroot directory, related to requirements for directory ownership.

CVSS2 => (AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.9/10
10/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Openssh -> Openssh 
Openbsd -> Openssh 

 References:
http://lists.fedoraproject.org/pipermail/package-announce/2010-March/038214.html
http://lists.vmware.com/pipermail/security-announce/2010/000082.html
http://www.securityfocus.com/bid/36552
http://www.vupen.com/english/advisories/2010/0528
https://bugzilla.redhat.com/show_bug.cgi?id=522141
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9862
https://rhn.redhat.com/errata/RHSA-2009-1470.html

Copyright 2024, cxsecurity.com

 

Back to Top