Vulnerability Details : CVE-2008-1657
OpenSSH 4.4 up to versions before 4.9 allows remote authenticated users to bypass the sshd_config ForceCommand directive by modifying the .ssh/rc session file.
Products affected by CVE-2008-1657
- cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:4.6:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:4.7:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:4.8:*:*:*:*:*:*:*
Threat overview for CVE-2008-1657
Top countries where our scanners detected CVE-2008-1657
Top open port discovered on systems with this issue
22
IPs affected by CVE-2008-1657 33,026
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2008-1657!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2008-1657
3.94%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-1657
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST |
CWE ids for CVE-2008-1657
-
Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2008-1657
-
Red Hat 2008-04-03Not vulnerable. These issues did not affect the versions of OpenSSH as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
References for CVE-2008-1657
-
http://www.vupen.com/english/advisories/2008/1035/references
Site en constructionVendor Advisory
-
http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
Apple - Lists.apple.com
-
http://www.openssh.com/txt/release-4.9
Vendor Advisory
-
http://www.openbsd.org/errata43.html#001_openssh
OpenBSD 4.3 ErrataPatch
-
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00007.html
502 Bad Gateway
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41549
OpenSSH ForceCommand directive security bypass CVE-2008-1657 Vulnerability Report
-
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-005.txt.asc
-
http://www.vupen.com/english/advisories/2008/1624/references
Site en constructionVendor Advisory
-
http://www.securityfocus.com/archive/1/490488/100/0/threaded
-
http://aix.software.ibm.com/aix/efixes/security/ssh_advisory.asc
-
http://support.attachmate.com/techdocs/2374.html
Tech Note Not Available
-
http://www.securityfocus.com/bid/28531
Patch
-
http://www.ubuntu.com/usn/usn-649-1
USN-649-1: OpenSSH vulnerabilities | Ubuntu security notices | Ubuntu
-
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0139
-
http://www.vupen.com/english/advisories/2008/2396
Site en constructionVendor Advisory
-
http://www.us-cert.gov/cas/techalerts/TA08-260A.html
Page Not Found | CISAUS Government Resource
-
http://www.vupen.com/english/advisories/2008/2584
Site en constructionVendor Advisory
-
http://www.gentoo.org/security/en/glsa/glsa-200804-03.xml
OpenSSH: Privilege escalation (GLSA 200804-03) — Gentoo security
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:098
Mandriva
-
https://issues.rpath.com/browse/RPL-2419
-
http://www.securitytracker.com/id?1019733
Access Denied
Jump to