Lucene search

K
freebsdFreeBSD2C948527-D823-11E6-9171-14DAE9D210B8
HistoryJan 11, 2017 - 12:00 a.m.

FreeBSD -- OpenSSH multiple vulnerabilities

2017-01-1100:00:00
vuxml.freebsd.org
57

0.102 Low

EPSS

Percentile

94.9%

Problem Description:
The ssh-agent(1) agent supports loading a PKCS#11 module
from outside a trusted whitelist. An attacker can request
loading of a PKCS#11 module across forwarded agent-socket.
[CVE-2016-10009]
When privilege separation is disabled, forwarded Unix
domain sockets would be created by sshd(8) with the privileges
of ‘root’ instead of the authenticated user. [CVE-2016-10010]
Impact:
A remote attacker who have control of a forwarded
agent-socket on a remote system and have the ability to
write files on the system running ssh-agent(1) agent can
run arbitrary code under the same user credential. Because
the attacker must already have some control on both systems,
it is relatively hard to exploit this vulnerability in a
practical attack. [CVE-2016-10009]
When privilege separation is disabled (on FreeBSD,
privilege separation is enabled by default and has to be
explicitly disabled), an authenticated attacker can potentially
gain root privileges on systems running OpenSSH server.
[CVE-2016-10010]

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchopenssh-portable< 7.3.p1_5,1UNKNOWN
FreeBSDanynoarchfreebsd= 11.0UNKNOWN
FreeBSDanynoarchfreebsd< 11.0_7UNKNOWN