Vulnerability Name: | CVE-2004-1653 (CCN-17213) |
Assigned: | 2004-08-31 |
Published: | 2004-08-31 |
Updated: | 2017-07-11 |
Summary: | The default configuration for OpenSSH enables AllowTcpForwarding, which could allow remote authenticated users to perform a port bounce, when configured with an anonymous access program such as AnonCVS.
|
CVSS v3 Severity: | 6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): None |
|
CVSS v2 Severity: | 6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N) 4.7 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): None | 6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N) 4.7 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): None |
|
Vulnerability Type: | CWE-Other
|
Vulnerability Consequences: | Configuration |
References: | Source: CCN Type: BugTraq Mailing List, Tue Aug 31 2004 - 17:38:38 CDT SSHD / AnonCVS Nastyness
Source: MITRE Type: CNA CVE-2004-1653
Source: BUGTRAQ Type: UNKNOWN 20040831 SSHD / AnonCVS Nastyness
Source: CCN Type: SECTRACK ID: 1011143 OpenSSH Default Configuration May Be Unsafe When Used With Anonymous SSH Services
Source: SECTRACK Type: UNKNOWN 1011143
Source: CCN Type: IBM APAR OA25412 OA25412: DOC UPDATE FOR "IBM PORTED TOOLS FOR Z/OS" OPENSSH 5655M2301
Source: OSVDB Type: UNKNOWN 9562
Source: CCN Type: OSVDB ID: 9562 OpenSSH Default Configuration Anon SSH Service Port Bounce Weakness
Source: XF Type: UNKNOWN openssh-port-bounce(17213)
Source: XF Type: UNKNOWN openssh-port-bounce(17213)
Source: CONFIRM Type: UNKNOWN https://security.netapp.com/advisory/ntap-20191107-0001/
|
Vulnerable Configuration: | Configuration 1: cpe:/a:openbsd:openssh:*:*:*:*:*:*:*:* (Version <= 3.9) Configuration CCN 1: cpe:/a:openbsd:openssh:2.1.1:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.5.2:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.5:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.5.1:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.9:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.0:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.2.2:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.4:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.0.1:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.0.2:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.1:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.2:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.3:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.5:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.6:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.6.1:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.7:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.7.1:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.8:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.8.1:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.9:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.2:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.3:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:2.9.9:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:1.2.2:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:1.2.3:-:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:1.2:*:*:*:*:*:*:*OR cpe:/a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*AND cpe:/o:ibm:z/os:*:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |