OpenSSH < 1.2.2 sshd Local TCP Redirection Connection Masking Weakness

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.

Synopsis :

The SSH server running on the remote host allows connections to be

Description :

According to its banner, the version of OpenSSH running on the remote
host allows local users without shell access to redirect TCP
connections with the IDENT '[email protected]'. A local attacker could
use this incorrect IDENT to bypass monitoring/logging.

See also :

Solution :

Either upgrade to OpenSSH 1.2.2 or later or use one of the 'IMMUNE
CONFIGURATIONS' referenced in the advisory titled

Risk factor :

Medium / CVSS Base Score : 4.6

Family: Misc.

Nessus Plugin ID: 17699 ()

Bugtraq ID:

CVE ID: CVE-2000-0143

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now