Vulnerability Name: | CVE-2001-1459 (CCN-6757) | ||||||||
Assigned: | 2001-06-19 | ||||||||
Published: | 2001-06-19 | ||||||||
Updated: | 2017-07-11 | ||||||||
Summary: | OpenSSH 2.9 and earlier does not initiate a Pluggable Authentication Module (PAM) session if commands are executed with no pty, which allows local users to bypass resource limits (rlimits) set in pam.d. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Bypass Security | ||||||||
References: | Source: CCN Type: BugTraq Mailing List, Mon Jun 18 2001 - 20:11:02 CDT pam session Source: MITRE Type: CNA CVE-2001-1459 Source: BUGTRAQ Type: UNKNOWN 20010619 pam session Source: DEBIAN Type: DSA-025 openssh -- Missing PAM support Source: CCN Type: US-CERT VU#797027 OpenSSH does not initialize PAM session thereby allowing PAM restrictions to be bypassed Source: CERT-VN Type: Third Party Advisory, US Government Resource VU#797027 Source: CCN Type: OSVDB ID: 18236 OpenSSH no pty Command Execution Local PAM Restriction Bypass Source: BID Type: Vendor Advisory 2917 Source: CCN Type: BID-2917 OpenSSH PAM Session Evasion Vulnerability Source: CCN Type: BID-292 Solaris aspppd Insecure Temporary File Creation Vulnerability Source: XF Type: UNKNOWN openssh-rsh-bypass-pam(6757) Source: XF Type: UNKNOWN openssh-rsh-bypass-pam(6757) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |