ID CVE-2007-3102
Summary Unspecified vulnerability in the linux_audit_record_event function in OpenSSH 4.3p2, as used on Fedora Core 6 and possibly other systems, allows remote attackers to write arbitrary characters to an audit log via a crafted username. NOTE: some of these details are obtained from third party information.
References
Vulnerable Configurations
  • cpe:2.3:o:fedora_project:fedora_core:6:*:*:*:*:*:*:*
    cpe:2.3:o:fedora_project:fedora_core:6:*:*:*:*:*:*:*
  • cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*
    cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 11-10-2017 - 01:32)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:P/A:N
oval via4
accepted 2013-04-29T04:11:40.524-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
  • comment The operating system installed on the system is Red Hat Enterprise Linux 5
    oval oval:org.mitre.oval:def:11414
  • comment The operating system installed on the system is CentOS Linux 5.x
    oval oval:org.mitre.oval:def:15802
  • comment Oracle Linux 5.x
    oval oval:org.mitre.oval:def:15459
description Unspecified vulnerability in the linux_audit_record_event function in OpenSSH 4.3p2, as used on Fedora Core 6 and possibly other systems, allows remote attackers to write arbitrary characters to an audit log via a crafted username. NOTE: some of these details are obtained from third party information.
family unix
id oval:org.mitre.oval:def:11124
status accepted
submitted 2010-07-09T03:56:16-04:00
title Unspecified vulnerability in the linux_audit_record_event function in OpenSSH 4.3p2, as used on Fedora Core 6 and possibly other systems, allows remote attackers to write arbitrary characters to an audit log via a crafted username. NOTE: some of these details are obtained from third party information.
version 25
redhat via4
advisories
  • bugzilla
    id 248059
    title CVE-2007-3102 audit logging of failed logins
    oval
    AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhba:tst:20070331001
    • OR
      • AND
        • comment openssh is earlier than 0:4.3p2-24.el5
          oval oval:com.redhat.rhsa:tst:20070540002
        • comment openssh is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070540003
      • AND
        • comment openssh-askpass is earlier than 0:4.3p2-24.el5
          oval oval:com.redhat.rhsa:tst:20070540008
        • comment openssh-askpass is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070540009
      • AND
        • comment openssh-clients is earlier than 0:4.3p2-24.el5
          oval oval:com.redhat.rhsa:tst:20070540006
        • comment openssh-clients is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070540007
      • AND
        • comment openssh-server is earlier than 0:4.3p2-24.el5
          oval oval:com.redhat.rhsa:tst:20070540004
        • comment openssh-server is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070540005
    rhsa
    id RHSA-2007:0540
    released 2007-11-07
    severity Moderate
    title RHSA-2007:0540: openssh security and bug fix update (Moderate)
  • bugzilla
    id 243204
    title CVE-2007-3102 audit logging of failed logins
    oval
    AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhba:tst:20070331001
    • OR
      • AND
        • comment pam is earlier than 0:0.99.6.2-3.26.el5
          oval oval:com.redhat.rhsa:tst:20070555002
        • comment pam is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070555003
      • AND
        • comment pam-devel is earlier than 0:0.99.6.2-3.26.el5
          oval oval:com.redhat.rhsa:tst:20070555004
        • comment pam-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070555005
    rhsa
    id RHSA-2007:0555
    released 2007-11-07
    severity Moderate
    title RHSA-2007:0555: pam security, bug fix, and enhancement update (Moderate)
  • bugzilla
    id 248058
    title CVE-2007-3102 audit logging of failed logins
    oval
    AND
    • comment Red Hat Enterprise Linux 4 is installed
      oval oval:com.redhat.rhba:tst:20070304001
    • OR
      • AND
        • comment openssh is earlier than 0:3.9p1-8.RHEL4.24
          oval oval:com.redhat.rhsa:tst:20070703002
        • comment openssh is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060697003
      • AND
        • comment openssh-askpass is earlier than 0:3.9p1-8.RHEL4.24
          oval oval:com.redhat.rhsa:tst:20070703010
        • comment openssh-askpass is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060697011
      • AND
        • comment openssh-askpass-gnome is earlier than 0:3.9p1-8.RHEL4.24
          oval oval:com.redhat.rhsa:tst:20070703008
        • comment openssh-askpass-gnome is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060697009
      • AND
        • comment openssh-clients is earlier than 0:3.9p1-8.RHEL4.24
          oval oval:com.redhat.rhsa:tst:20070703006
        • comment openssh-clients is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060697005
      • AND
        • comment openssh-server is earlier than 0:3.9p1-8.RHEL4.24
          oval oval:com.redhat.rhsa:tst:20070703004
        • comment openssh-server is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060697007
    rhsa
    id RHSA-2007:0703
    released 2007-11-15
    severity Moderate
    title RHSA-2007:0703: openssh security and bug fix update (Moderate)
  • bugzilla
    id 267201
    title pam_cracklib.so disregards changes to last char when calculating similarity
    oval
    AND
    • comment Red Hat Enterprise Linux 4 is installed
      oval oval:com.redhat.rhba:tst:20070304001
    • OR
      • AND
        • comment pam is earlier than 0:0.77-66.23
          oval oval:com.redhat.rhsa:tst:20070737002
        • comment pam is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20070465003
      • AND
        • comment pam-devel is earlier than 0:0.77-66.23
          oval oval:com.redhat.rhsa:tst:20070737004
        • comment pam-devel is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20070465005
    rhsa
    id RHSA-2007:0737
    released 2007-11-15
    severity Moderate
    title RHSA-2007:0737: pam security, bug fix, and enhancement update (Moderate)
rpms
  • openssh-0:4.3p2-24.el5
  • openssh-askpass-0:4.3p2-24.el5
  • openssh-clients-0:4.3p2-24.el5
  • openssh-server-0:4.3p2-24.el5
  • pam-0:0.99.6.2-3.26.el5
  • pam-devel-0:0.99.6.2-3.26.el5
  • openssh-0:3.9p1-8.RHEL4.24
  • openssh-askpass-0:3.9p1-8.RHEL4.24
  • openssh-askpass-gnome-0:3.9p1-8.RHEL4.24
  • openssh-clients-0:3.9p1-8.RHEL4.24
  • openssh-server-0:3.9p1-8.RHEL4.24
  • pam-0:0.77-66.23
  • pam-devel-0:0.77-66.23
refmap via4
bid 26097
confirm
fedora FEDORA-2007-715
misc https://bugzilla.redhat.com/show_bug.cgi?id=248059
osvdb 39214
secunia
  • 27235
  • 27588
  • 27590
  • 28319
  • 28320
Last major update 11-10-2017 - 01:32
Published 18-10-2007 - 20:17
Back to Top