OpenSSH UseLogin Environment Variable Local Command Execution
Local Access Required
Loss of Confidentiality,
Loss of Integrity,
Loss of Availability
OpenSSH contains a flaw that may allow a malicious local attacker to execute arbitrary code on the system. The issue is triggered by a vulnerability in the UseLogin configuration option. If the UseLogin option is enabled, a local attacker can set the LD_PRELOAD or LD_LIBRARY_PATH environment variable to point to a maliciously created shared library file, which would be executed with superuser privileges when the login program is executed. This flaw may lead to a loss of Confidentiality, Integrity, and/or Availability.
Upgrade to version 3.0.2 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by applying the vendor-supplied patch, or by disabling UseLogin in the configuration.