Vulnerability Name:

CVE-2014-9278 (CCN-99090)

Assigned:2014-10-03
Published:2014-10-03
Updated:2017-09-08
Summary:The OpenSSH server, as used in Fedora and Red Hat Enterprise Linux 7 and when running in a Kerberos environment, allows remote authenticated users to log in as another user when they are listed in the .k5users file of that user, which might bypass intended authentication requirements that would force a local login.
CVSS v3 Severity:3.5 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N)
3.0 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N)
3.0 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
4.9 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:N)
3.6 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-287
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2014-9278

Source: CCN
Type: RHSA-2015-0425
Moderate: openssh security, bug fix and enhancement update

Source: REDHAT
Type: UNKNOWN
RHSA-2015:0425

Source: CCN
Type: oss-security Mailing List, Tue, 02 Dec 2014 15:56:14 +0100
CVE request: OpenSSH ~/.k5users patch (Fedora and downstreams)

Source: MISC
Type: UNKNOWN
http://thread.gmane.org/gmane.comp.encryption.kerberos.general/15855

Source: CCN
Type: OpenSSH Web site
Portable OpenSSH

Source: MLIST
Type: UNKNOWN
[oss-security] 20141202 CVE request: OpenSSH ~/.k5users patch (Fedora and downstreams)

Source: MLIST
Type: UNKNOWN
[oss-security] 20141204 Re: CVE request: OpenSSH ~/.k5users patch (Fedora and downstreams)

Source: BID
Type: UNKNOWN
71420

Source: CCN
Type: BID-71420
Portable OpenSSH 'gss-serv-krb5.c' Security Bypass Vulnerability

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.mindrot.org/show_bug.cgi?id=1867

Source: CCN
Type: Red Hat Bugzilla – Bug 1169843
openssh: k5users unexpectedly grants remote login

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=1169843

Source: XF
Type: UNKNOWN
openssh-gssservkrb5-sec-bypass(99090)

Source: XF
Type: UNKNOWN
openssh-gssservkrb5-sec-bypass(99090)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:openbsd:openssh:-:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:fedora:7:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.redhat.rhsa:def:20150425
    P
    RHSA-2015:0425: openssh security, bug fix and enhancement update (Moderate)
    2015-03-05
    oval:com.ubuntu.precise:def:20149278000
    V
    CVE-2014-9278 on Ubuntu 12.04 LTS (precise) - medium.
    2014-12-06
    oval:com.ubuntu.trusty:def:20149278000
    V
    CVE-2014-9278 on Ubuntu 14.04 LTS (trusty) - medium.
    2014-12-06
    BACK
    openbsd openssh -
    redhat enterprise linux 7.0
    redhat fedora 7