Vulnerabilidad en OpenSSH (CVE-2014-2532)
Gravedad CVSS v3.1:
MEDIA
Tipo:
CWE-264
Permisos, privilegios y/o control de acceso
Fecha de publicación:
18/03/2014
Última modificación:
12/04/2025
Descripción
sshd en OpenSSH anterior a 6.6 no soporta debidamente comodines en líneas AcceptEnv en sshd_config, lo que permite a atacantes remotos evadir restricciones de entorno mediante el uso de una subcadena localizada antes de un caracter de comodín.
Impacto
Puntuación base 3.x
4.90
Gravedad 3.x
MEDIA
Puntuación base 2.0
5.80
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:oracle:communications_user_data_repository:10.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:* | 6.5 (incluyendo) | |
cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:openbsd:openssh:6.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:openbsd:openssh:6.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:openbsd:openssh:6.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:openbsd:openssh:6.4:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://advisories.mageia.org/MGASA-2014-0143.html
- http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html
- http://marc.info/?l=bugtraq&m=141576985122836&w=2
- http://marc.info/?l=bugtraq&m=141576985122836&w=2
- http://marc.info/?l=openbsd-security-announce&m=139492048027313&w=2
- http://rhn.redhat.com/errata/RHSA-2014-1552.html
- http://secunia.com/advisories/57488
- http://secunia.com/advisories/57574
- http://secunia.com/advisories/59313
- http://secunia.com/advisories/59855
- http://www.debian.org/security/2014/dsa-2894
- http://www.mandriva.com/security/advisories?name=MDVSA-2014%3A068
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A095
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/66355
- http://www.securitytracker.com/id/1029925
- http://www.ubuntu.com/usn/USN-2155-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/91986
- https://support.apple.com/HT205267
- http://advisories.mageia.org/MGASA-2014-0143.html
- http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html
- http://marc.info/?l=bugtraq&m=141576985122836&w=2
- http://marc.info/?l=bugtraq&m=141576985122836&w=2
- http://marc.info/?l=openbsd-security-announce&m=139492048027313&w=2
- http://rhn.redhat.com/errata/RHSA-2014-1552.html
- http://secunia.com/advisories/57488
- http://secunia.com/advisories/57574
- http://secunia.com/advisories/59313
- http://secunia.com/advisories/59855
- http://www.debian.org/security/2014/dsa-2894
- http://www.mandriva.com/security/advisories?name=MDVSA-2014%3A068
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A095
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/66355
- http://www.securitytracker.com/id/1029925
- http://www.ubuntu.com/usn/USN-2155-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/91986
- https://support.apple.com/HT205267