AIX OpenSSH Advisory : openssh_advisory6.asc

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote AIX host has a version of OpenSSH installed that is
affected by multiple vulnerabilities.

Description :

The remote AIX host has a version of OpenSSH installed that is
affected by the following vulnerabilities :

- A flaw exists in the monitor component when handling
extraneous username data in MONITOR_REQ_PAM_INIT_CTX
requests. A local attacker can exploit this issue to
conduct an impersonation attack, by sending a crafted
MONITOR_REQ_PWNAM request that leverages any SSH login
access with control of the sshd UID. (CVE-2015-6563)

- A use-after-free error exists in function
mm_answer_pam_free_ctx() in the file monitor.c when
handling MONITOR_REQ_PAM_FREE_CTX requests. A local
attacker can exploit this to gain elevated privileges,
by leveraging control of the sshd UID to send an
unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
(CVE-2015-6564)

See also :

http://aix.software.ibm.com/aix/efixes/security/openssh_advisory6.asc
https://www-01.ibm.com/marketing/iwm/iwm/web/preLogin.do?source=aixbp

Solution :

A fix is available and can be downloaded from the AIX website.

Risk factor :

Medium / CVSS Base Score : 6.9
(CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 5.1
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: AIX Local Security Checks

Nessus Plugin ID: 86656 ()

Bugtraq ID: 76317

CVE ID: CVE-2015-6563
CVE-2015-6564

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now