#VU32557 Permissions, Privileges, and Access Controls in OpenSSH - CVE-2014-2532


| Updated: 2020-07-28

Vulnerability identifier: #VU32557

Vulnerability risk: Medium

CVSSv4.0: 0.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:U/U:Green]

CVE-ID: CVE-2014-2532

CWE-ID: CWE-264

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
OpenSSH
Server applications / Remote management servers, RDP, SSH

Vendor: OpenSSH

Description

The vulnerability allows a remote authenticated user to read and manipulate data.

sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.

Mitigation
Install update from vendor's website.

Vulnerable software versions

OpenSSH: 6.0 - 6.5p1


External links
https://advisories.mageia.org/MGASA-2014-0143.html
https://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc
https://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
https://lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html
https://lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html
https://marc.info/?l=bugtraq&m=141576985122836&w=2
https://marc.info/?l=openbsd-security-announce&m=139492048027313&w=2
https://rhn.redhat.com/errata/RHSA-2014-1552.html
https://secunia.com/advisories/57488
https://secunia.com/advisories/57574
https://secunia.com/advisories/59313
https://secunia.com/advisories/59855
https://www.debian.org/security/2014/dsa-2894
https://www.mandriva.com/security/advisories?name=MDVSA-2014:068
https://www.mandriva.com/security/advisories?name=MDVSA-2015:095
https://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
https://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
https://www.securityfocus.com/bid/66355
https://www.securitytracker.com/id/1029925
https://www.ubuntu.com/usn/USN-2155-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/91986
https://support.apple.com/HT205267


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability