Vulnerability Details : CVE-2005-2797
OpenSSH 4.0, and other versions before 4.2, does not properly handle dynamic port forwarding ("-D" option) when a listen address is not provided, which may cause OpenSSH to enable the GatewayPorts functionality.
Threat overview for CVE-2005-2797
Top countries where our scanners detected CVE-2005-2797
Top open port discovered on systems with this issue
22
IPs affected by CVE-2005-2797 4,130
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2005-2797!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2005-2797
Probability of exploitation activity in the next 30 days: 0.93%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 81 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2005-2797
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
Vendor statements for CVE-2005-2797
-
Red Hat 2009-11-25Not vulnerable. This issue did not affect the versions of OpenSSH as shipped with Red Hat Enterprise Linux 2.1, 3 or 4.
-
http://www.mindrot.org/pipermail/openssh-unix-announce/2005-September/000083.html
Patch;Vendor Advisory
- ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.53/SCOSA-2005.53.txt
-
http://marc.info/?l=bugtraq&m=112605977304049&w=2
- http://support.avaya.com/elmodocs2/security/ASA-2006-033.htm
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.11/SCOSA-2006.11.txt
- http://secunia.com/advisories/18661
-
http://www.securityfocus.com/bid/14727
- http://securitytracker.com/id?1014845
- cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*