OpenSSH Kerberos TGT/AFS Token Passing Remote Overflow

This script is Copyright (C) 2002-2012 Thomas Reinke

Synopsis :

Arbitrary code may be run on the remote host.

Description :

You are running a version of OpenSSH older than OpenSSH 3.2.1.

A buffer overflow exists in the daemon if AFS is enabled on
your system, or if the options KerberosTgtPassing or
AFSTokenPassing are enabled. Even in this scenario, the
vulnerability may be avoided by enabling UsePrivilegeSeparation.

Versions prior to 2.9.9 are vulnerable to a remote root
exploit. Versions prior to 3.2.1 are vulnerable to a local
root exploit.

Solution :

Upgrade to version 3.2.1 or later.

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.2
Public Exploit Available : true

Family: Gain a shell remotely

Nessus Plugin ID: 10954 ()

Bugtraq ID: 4560

CVE ID: CVE-2002-0575

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now