Vulnerability Name: | CVE-2003-0386 (CCN-12196) |
Assigned: | 2003-06-05 |
Published: | 2003-06-05 |
Updated: | 2017-10-11 |
Summary: | OpenSSH 3.6.1 and earlier, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote attackers to bypass "from=" and "user@host" address restrictions by connecting to a host from a system whose reverse DNS hostname contains the numeric IP address.
|
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-Other
|
Vulnerability Consequences: | Gain Access |
References: | Source: SGI Type: UNKNOWN 20060703-01-P
Source: CCN Type: BugTraq Mailing List, Wed Jun 04 2003 - 19:04:25 CDT OpenSSH remote clent address restriction circumvention
Source: MITRE Type: CNA CVE-2003-0386
Source: CCN Type: AppleCare Knowledge Base Document 61798 Security Update 2003-08-14
Source: CONFIRM Type: UNKNOWN http://lists.apple.com/mhonarc/security-announce/msg00038.html
Source: CCN Type: RHSA-2006-0298 openssh security update
Source: CCN Type: RHSA-2006-0698 openssh security update
Source: SECUNIA Type: UNKNOWN 21129
Source: SECUNIA Type: UNKNOWN 21262
Source: CCN Type: SA21724 Avaya Products OpenSSH Shell Command Injection and Security Bypass
Source: SECUNIA Type: UNKNOWN 21724
Source: SECUNIA Type: UNKNOWN 22196
Source: CCN Type: SA23680 VMWare ESX Server Multiple Vulnerabilities
Source: SECUNIA Type: UNKNOWN 23680
Source: CONFIRM Type: UNKNOWN http://support.avaya.com/elmodocs2/security/ASA-2006-174.htm
Source: CCN Type: ASA-2006-174 openssh security update (RHSA-2006-0298)
Source: CCN Type: US-CERT VU#978316 Vulnerability in OpenSSH daemon (sshd)
Source: CERT-VN Type: Exploit, Patch, Third Party Advisory, US Government Resource VU#978316
Source: REDHAT Type: UNKNOWN RHSA-2006:0298
Source: REDHAT Type: UNKNOWN RHSA-2006:0698
Source: BUGTRAQ Type: Exploit, Patch, Vendor Advisory 20030605 OpenSSH remote clent address restriction circumvention
Source: BID Type: UNKNOWN 7831
Source: CCN Type: BID-7831 OpenSSH Reverse DNS Lookup Access Control Bypass Vulnerability
Source: CONFIRM Type: UNKNOWN http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Source: CONFIRM Type: UNKNOWN http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Source: XF Type: UNKNOWN openssh-login-restrictions-bypass(12196)
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:9894
|
Vulnerable Configuration: | Configuration 1: cpe:/a:openbsd:openssh:3.6.1:-:*:*:*:*:*:* Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:3:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* Configuration CCN 1: cpe:/a:openbsd:openssh:2.1.1:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.5.2:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.5:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.5.1:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.9:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.0:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.2.2:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.4:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.0.1:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.0.2:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.1:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.2:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.3:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.5:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.6:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.6.1:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.2:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.3:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.9.9:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:1.2.2:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:1.2.3:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:1.2:*:*:*:*:*:*:*AND cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:* Denotes that component is vulnerable |
Oval Definitions |
Definition ID | Class | Title | Last Modified |
---|
oval:org.mitre.oval:def:9894 | V | OpenSSH 3.6.1 and earlier, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote attackers to bypass "from=" and "user@host" address restrictions by connecting to a host from a system whose reverse DNS hostname contains the numeric IP address. | 2013-04-29 | oval:com.redhat.rhsa:def:20060298 | P | RHSA-2006:0298: openssh security update (Low) | 2008-03-20 |
|
BACK |