Portable OpenSSH < 3.7.1p2 Multiple PAM Vulnerabilities

high Nessus Network Monitor Plugin ID 1996

Synopsis

The remote host is vulnerable to a flaw that allows for the bypassing of authentication.

Description

The remote host is portable OpenSSH 3.7p1 or 3.7.1p1.
Versions older than 3.7.1p2 are vulnerable to a flaws that handle PAM authentication and may allow an attacker to gain a shell on this host.

Solution

Upgrade to OpenSSH 3.7.1p2 or higher or disable PAM support in sshd_config.

See Also

http://www.kb.cert.org/vuls/id/602204

Plugin Details

Severity: High

ID: 1996

Family: SSH

Published: 8/20/2004

Updated: 3/6/2019

Nessus ID: 11848

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.2

Temporal Score: 5.1

Vector: CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 7.4

Temporal Score: 6.9

Vector: CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:openbsd:openssh

Reference Information

CVE: CVE-2003-0786, CVE-2003-0787

BID: 8677