ID |
CVE-2000-0525
|
Summary |
OpenSSH does not properly drop privileges when the UseLogin option is enabled, which allows local users to execute arbitrary commands by providing the command to the ssh daemon. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*
-
cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*
-
cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*
|
CVSS |
Base: | 10.0 (as of 10-10-2017 - 01:29) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
COMPLETE |
COMPLETE |
COMPLETE |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
refmap
via4
|
bid | 1334 | bugtraq | 20000609 OpenSSH's UseLogin option allows remote access with root privilege. | openbsd | 20000606 The non-default UseLogin feature in /etc/sshd_config is broken and should not be used. | osvdb | 341 | xf | openssh-uselogin-remote-exec(4646) |
|
Last major update |
10-10-2017 - 01:29 |
Published |
08-06-2000 - 04:00 |
Last modified |
10-10-2017 - 01:29 |