CVE-2000-0532
CVSS7.5
发布时间 :2000-06-07 00:00:00
修订时间 :2008-09-05 16:21:15
NMCO    

[原文]A FreeBSD patch for SSH on 2000-01-14 configures ssh to listen on port 722 as well as port 22, which might allow remote attackers to access SSH through port 722 even if port 22 is otherwise filtered.


[CNNVD]2000-1-14 FreeBSD SSH端口访问漏洞(CNNVD-200006-029)

        2000-01-14的SSH FreeBSD补丁配置ssh侦听端口22和端口722。远程攻击者利用此漏洞可以通过端口722访问SSH,即使端口22在其他方面被过滤。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0532
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0532
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200006-029
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/static/4638.php
(VENDOR_ADVISORY)  XF  freebsd-ssh-ports
http://www.securityfocus.com/bid/1323
(VENDOR_ADVISORY)  BID  1323
http://archives.neohapsis.com/archives/freebsd/2000-06/0031.html
(VENDOR_ADVISORY)  FREEBSD  FreeBSD-SA-00:21
http://www.osvdb.org/1387
(UNKNOWN)  OSVDB  1387

- 漏洞信息

2000-1-14 FreeBSD SSH端口访问漏洞
高危 未知
2000-06-07 00:00:00 2005-05-02 00:00:00
远程  
        2000-01-14的SSH FreeBSD补丁配置ssh侦听端口22和端口722。远程攻击者利用此漏洞可以通过端口722访问SSH,即使端口22在其他方面被过滤。

- 公告与补丁

        

- 漏洞信息

1387
FreeBSD SSH Port Extra Network Port
Remote / Network Access Misconfiguration
Loss of Integrity
Exploit Public

- 漏洞描述

SSH port in FreeBSD contains a misconfiguration in its sshd_config file that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when the SSH daemon is configured to listen on network port 722, in addition to the usual port 22. This flaw may allow malicious users to bypass firewall restrictions and lead to a loss of integrity.

- 时间线

2000-06-07 Unknow
2000-06-07 Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue. While various solutions are available, it is possible to fully correct the flaw by simply removing the line "Port 722" in /usr/local/etc/sshd_config and restarting sshd.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站