CVE-2014-2532
openssh: AcceptEnv environment restriction bypass flaw
Severity Score
4.9
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
sshd en OpenSSH anterior a 6.6 no soporta debidamente comodines en líneas AcceptEnv en sshd_config, lo que permite a atacantes remotos evadir restricciones de entorno mediante el uso de una subcadena localizada antes de un caracter de comodín.
It was found that OpenSSH did not properly handle certain AcceptEnv parameter values with wildcard characters. A remote attacker could use this flaw to bypass intended environment variable restrictions.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2014-03-17 CVE Reserved
- 2014-03-18 CVE Published
- 2024-08-06 CVE Updated
- 2024-10-03 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-138: Improper Neutralization of Special Elements
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (25)
URL | Tag | Source |
---|---|---|
http://advisories.mageia.org/MGASA-2014-0143.html | X_refsource_confirm | |
http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc | X_refsource_confirm | |
http://marc.info/?l=openbsd-security-announce&m=139492048027313&w=2 | Mailing List | |
http://secunia.com/advisories/57488 | Third Party Advisory | |
http://secunia.com/advisories/57574 | Third Party Advisory | |
http://secunia.com/advisories/59313 | Third Party Advisory | |
http://secunia.com/advisories/59855 | Third Party Advisory | |
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html | X_refsource_confirm | |
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html | X_refsource_confirm | |
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html | X_refsource_confirm | |
http://www.securityfocus.com/bid/66355 | Vdb Entry | |
http://www.securitytracker.com/id/1029925 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/91986 | Vdb Entry | |
https://support.apple.com/HT205267 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Oracle Search vendor "Oracle" | Communications User Data Repository Search vendor "Oracle" for product "Communications User Data Repository" | 10.0.1 Search vendor "Oracle" for product "Communications User Data Repository" and version "10.0.1" | - |
Affected
| ||||||
Openbsd Search vendor "Openbsd" | Openssh Search vendor "Openbsd" for product "Openssh" | <= 6.5 Search vendor "Openbsd" for product "Openssh" and version " <= 6.5" | - |
Affected
| ||||||
Openbsd Search vendor "Openbsd" | Openssh Search vendor "Openbsd" for product "Openssh" | 6.0 Search vendor "Openbsd" for product "Openssh" and version "6.0" | - |
Affected
| ||||||
Openbsd Search vendor "Openbsd" | Openssh Search vendor "Openbsd" for product "Openssh" | 6.1 Search vendor "Openbsd" for product "Openssh" and version "6.1" | - |
Affected
| ||||||
Openbsd Search vendor "Openbsd" | Openssh Search vendor "Openbsd" for product "Openssh" | 6.2 Search vendor "Openbsd" for product "Openssh" and version "6.2" | - |
Affected
| ||||||
Openbsd Search vendor "Openbsd" | Openssh Search vendor "Openbsd" for product "Openssh" | 6.3 Search vendor "Openbsd" for product "Openssh" and version "6.3" | - |
Affected
| ||||||
Openbsd Search vendor "Openbsd" | Openssh Search vendor "Openbsd" for product "Openssh" | 6.4 Search vendor "Openbsd" for product "Openssh" and version "6.4" | - |
Affected
|