Lucene search

K
cloudfoundryCloud FoundryCFOUNDRY:782597A83B98B15285C8A73B8555B7B2
HistoryJun 13, 2016 - 12:00 a.m.

USN-2966-1 OpenSSH vulnerabilities | Cloud Foundry

2016-06-1300:00:00
Cloud Foundry
www.cloudfoundry.org
46

0.023 Low

EPSS

Percentile

89.8%

USN-2966-1 OpenSSH vulnerabilities

Low

Vendor

Canonical Ubuntu, openssh

Versions Affected

  • Canonical Ubuntu 14.04 LTS

Description

Shayan Sadigh discovered that OpenSSH incorrectly handled environment files when the UseLogin feature is enabled. A local attacker could use this issue to gain privileges. (CVE-2015-8325)

Ben Hawkes discovered that OpenSSH incorrectly handled certain network traffic. A remote attacker could possibly use this issue to cause OpenSSH to crash, resulting in a denial of service. This issue only applied to Ubuntu 15.10. (CVE-2016-1907)

Thomas Hoger discovered that OpenSSH incorrectly handled untrusted X11 forwarding when the SECURITY extension is disabled. A connection configured as being untrusted could get switched to trusted in certain scenarios, contrary to expectations. (CVE-2016-1908)

It was discovered that OpenSSH incorrectly handled certain X11 forwarding data. A remote authenticated attacker could possibly use this issue to bypass certain intended command restrictions. (CVE-2016-3115)

Affected Products and Versions

_Severity is low unless otherwise noted.
_

  • All versions of Cloud Foundry cflinuxfs2 prior to v.1.56.0
  • Cloud Foundry BOSH stemcells 3146.x versions prior to 3146.12 AND other versions prior to 3232.4 are vulnerable

Mitigation

Users of affected versions should apply the following mitigation:

  • The Cloud Foundry project recommends that Cloud Foundry deployments run with cflinuxfs2 v.1.56.0 or later versions
  • The Cloud Foundry project recommends that Cloud Foundry upgrade BOSH stemcell 3146.x versions to 3146.12 OR other versions to 3232.4

Credit

Ben Hawkes, Thomas Hoger, Shayan Sadigh

References