OpenSSH < 2.9.9p1 Resource Limit Bypass

high Nessus Plugin ID 44069

Synopsis

The remote SSH service is affected by a denial of service vulnerability.

Description

According to its banner, the remote host is running a version of OpenSSH earlier than 2.9.9/2.9.9p1. Such versions fail to initiate a Pluggable Authentication Module (PAM) session if commands are executed with no pty. A remote, unauthenticated attacker, exploiting this flaw, could bypass resource limits (rlimits) set in pam.d.

Solution

Upgrade to OpenSSH 2.9.9/2.9.9p1 or later.

See Also

https://marc.info/?l=bugtraq&m=99324968918628&w=2

Plugin Details

Severity: High

ID: 44069

File Name: openssh_299p1.nasl

Version: 1.6

Type: remote

Family: Misc.

Published: 10/4/2011

Updated: 3/27/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2001-1459

Vulnerability Information

CPE: cpe:/a:openbsd:openssh

Required KB Items: installed_sw/OpenSSH

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 6/19/2001

Reference Information

CVE: CVE-2001-1459

BID: 2917

CERT: 797027