OpenSSH < 3.7 buffer_append_space Function Overflow

critical Nessus Network Monitor Plugin ID 1994

Synopsis

The remote host is vulnerable to an flaw that allows attackers to execute arbitrary commands.

Description

The remote host is running a version of OpenSSH that is vulnerable to a flaw in the buffer handling functions which may possibly leading to command execution.

Note: NNM has solely relied on the banner of the SSH client to perform this check. Any backported patches or workarounds such as recompiling or edited configurations are not observable through the banner.

Solution

Upgrade to OpenSSH 3.7 or higher.

Plugin Details

Severity: Critical

ID: 1994

Family: SSH

Published: 8/20/2004

Updated: 3/6/2019

Nessus ID: 11837

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:openbsd:openssh

Reference Information

CVE: CVE-2003-0693, CVE-2003-0695

BID: 8628