Lucene search

K
f5F5F5:K17263
HistorySep 17, 2015 - 12:00 a.m.

K17263 : OpenSSH vulnerabilities CVE-2015-6563 and CVE-2015-6564

2015-09-1700:00:00
my.f5.com
53

6.8 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.1%

Security Advisory Description

The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.

Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
Impact
A locally authenticated user can employ a highly complex exploit to conduct impersonation attacks by using an OpenSSH flaw.