CVE-2000-0525

Current Description

OpenSSH does not properly drop privileges when the UseLogin option is enabled, which allows local users to execute arbitrary commands by providing the command to the ssh daemon.

Basic Data

PublishedJune 08, 2000
Last ModifiedOctober 10, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score10.0
SeverityHIGH
Exploitability Score10.0
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationOpenbsdOpenssh1.2*******
    2.3ApplicationOpenbsdOpenssh1.2.3*******
    2.3ApplicationOpenbsdOpenssh2.1*******

Vulnerable Software List

VendorProductVersions
Openbsd Openssh 1.2, 1.2.3, 2.1

References

NameSourceURLTags
20000609 OpenSSH's UseLogin option allows remote access with root privilege.http://archives.neohapsis.com/archives/bugtraq/2000-06/0065.htmlBUGTRAQ
20000606 The non-default UseLogin feature in /etc/sshd_config is broken and should not be used.http://www.openbsd.org/errata.html#useloginOPENBSD
341http://www.osvdb.org/341OSVDB
1334http://www.securityfocus.com/bid/1334BID
openssh-uselogin-remote-exec(4646)https://exchange.xforce.ibmcloud.com/vulnerabilities/4646XF