This script is Copyright (C) 2017 Tenable Network Security, Inc.
The remote EulerOS host is missing a security update.
According to the version of the openssh packages installed, the
EulerOS installation on the remote host is affected by the following
- It was discovered that the OpenSSH sshd daemon fetched
PAM environment settings before running the login
program. In configurations with UseLogin=yes and the
pam_env PAM module configured to read user environment
settings, a local user could use this flaw to execute
arbitrary code as root. (CVE-2015-8325)
Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
See also :
Update the affected openssh package.
Risk factor :
High / CVSS Base Score : 7.2
CVSS Temporal Score : 5.3
Public Exploit Available : false