OracleVM 3.3 / 3.4 : openssh (OVMSA-2017-0053)

high Nessus Plugin ID 99080


The remote OracleVM host is missing one or more security updates.


The remote OracleVM system is missing necessary patches to address critical security updates :

- Allow to use ibmca crypto hardware (#1397547)

- CVE-2015-8325: privilege escalation via user's PAM environment and UseLogin=yes (1405374)

- Fix missing hmac-md5-96 from server offer (#1373836)

- Prevent infinite loop when Ctrl+Z pressed at password prompt (#1218424)

- Remove RC4 cipher and MD5 based MAC from the default client proposal (#1373836)

- Resolve sftp force permission colision with umask (#1341747)

- Relax bits needed check to allow hmac-sha2-512 with gss-group1-sha1- (#1353359)

- close ControlPersist background process stderr when not in debug mode (#1335539)

- Do not add a message 'The agent has no identities.' in ~/.ssh/authorized_keys (#1353410)

- ssh-copy-id: SunOS does not understand ~ (#1327547)


Update the affected openssh / openssh-clients / openssh-server packages.

See Also

Plugin Details

Severity: High

ID: 99080

File Name: oraclevm_OVMSA-2017-0053.nasl

Version: 3.4

Type: local

Published: 3/30/2017

Updated: 1/4/2021

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C


Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:vm:openssh, p-cpe:/a:oracle:vm:openssh-clients, p-cpe:/a:oracle:vm:openssh-server, cpe:/o:oracle:vm_server:3.3, cpe:/o:oracle:vm_server:3.4

Required KB Items: Host/local_checks_enabled, Host/OracleVM/release, Host/OracleVM/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 3/29/2017

Vulnerability Publication Date: 5/1/2016

Reference Information

CVE: CVE-2015-8325