OpenSSH >= 2.3.0 AllowTcpForwarding Port Bouncing

This script is Copyright (C) 2011 Tenable Network Security, Inc.


Synopsis :

The remote SSH server may permit anonymous port bouncing.

Description :

According to its banner, the remote host is running OpenSSH, version
2.3.0 or later. Such versions of OpenSSH allow forwarding TCP
connections. If the OpenSSH server is configured to allow anonymous
connections (e.g. AnonCVS), remote, unauthenticated users could use
the host as a proxy.

See also :

http://marc.info/?l=bugtraq&m=109413637313484&w=2
http://www.nessus.org/u?2c86d008

Solution :

Disallow anonymous users, set AllowTcpForwarding to 'no', or use the
Match directive to restrict anonymous users.

Risk factor :

Medium / CVSS Base Score : 6.4
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)

Family: Misc.

Nessus Plugin ID: 17744 ()

Bugtraq ID:

CVE ID: CVE-2004-1653

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial