SB2012012702 - Credentials management in OpenSSH



SB2012012702 - Credentials management in OpenSSH

Published: January 27, 2012 Updated: August 11, 2020

Security Bulletin ID SB2012012702
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Credentials management (CVE-ID: CVE-2012-0814)

The vulnerability allows a remote #AU# to gain access to sensitive information.

The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.


Remediation

Install update from vendor's website.