OpenSSH >= 2.3.0 AllowTcpForwarding Port Bouncing

This script is Copyright (C) 2011 Tenable Network Security, Inc.


Synopsis :

The remote SSH server may permit anonymous port bouncing.

Description :

According to its banner, the remote host is running OpenSSH, version
2.3.0 or later. Such versions of OpenSSH allow forwarding TCP
connections. If the OpenSSH server is configured to allow anonymous
connections (e.g. AnonCVS), remote, unauthenticated users could use
the host as a proxy.

See also :

http://marc.info/?l=bugtraq&m=109413637313484&w=2
http://www.nessus.org/u?2c86d008

Solution :

Disallow anonymous users, set AllowTcpForwarding to 'no', or use the
Match directive to restrict anonymous users.

Risk factor :

Medium / CVSS Base Score : 6.4
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)

Family: Misc.

Nessus Plugin ID: 17744 ()

Bugtraq ID:

CVE ID: CVE-2004-1653