OpenSSH < 1.2.2 sshd Local TCP Redirection Connection Masking Weakness

This script is Copyright (C) 2011 Tenable Network Security, Inc.


Synopsis :

The SSH server running on the remote host allows connections to be
redirected.

Description :

According to its banner, the version of OpenSSH running on the remote
host allows local users without shell access to redirect TCP
connections with the IDENT 'root@localhost'. A local attacker could
use this incorrect IDENT to bypass monitoring/logging.

See also :

http://archives.neohapsis.com/archives/bugtraq/2000-02/0119.html
http://archives.neohapsis.com/archives/bugtraq/2000-02/0131.html
http://archives.neohapsis.com/archives/bugtraq/2000-02/0150.html

Solution :

Either upgrade to OpenSSH 1.2.2 or later or use one of the 'IMMUNE
CONFIGURATIONS' referenced in the advisory titled
'sshd-restricted-users-incorrect-configuration'.

Risk factor :

Medium / CVSS Base Score : 4.6
(CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P)

Family: Misc.

Nessus Plugin ID: 17699 ()

Bugtraq ID:

CVE ID: CVE-2000-0143