#VU33287 Permissions, Privileges, and Access Controls in OpenSSH - CVE-2015-6565
Published: August 24, 2015 / Updated: August 4, 2020
OpenSSH
OpenSSH
Description
The vulnerability allows a local non-authenticated attacker to execute arbitrary code.
sshd in OpenSSH 6.8 and 6.9 uses world-writable permissions for TTY devices, which allows local users to cause a denial of service (terminal disruption) or possibly have unspecified other impact by writing to a device, as demonstrated by writing an escape sequence.
Remediation
External links
- http://openwall.com/lists/oss-security/2017/01/26/2
- http://www.openssh.com/txt/release-7.0
- http://www.openwall.com/lists/oss-security/2015/08/22/1
- http://www.securityfocus.com/bid/76497
- http://www.securitytracker.com/id/1033917
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://security.gentoo.org/glsa/201512-04
- https://www.exploit-db.com/exploits/41173/