First published: Tue Aug 31 2004(Updated: )
The default configuration for OpenSSH enables AllowTcpForwarding, which could allow remote authenticated users to perform a port bounce, when configured with an anonymous access program such as AnonCVS.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | <=3.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1653 is considered a moderate severity vulnerability due to its potential for unauthorized access via TCP forwarding.
To fix CVE-2004-1653, disable AllowTcpForwarding in the OpenSSH configuration file.
CVE-2004-1653 affects users of OpenSSH versions up to 3.9 with default configuration settings.
An attacker exploiting CVE-2004-1653 could perform a port bounce attack, potentially gaining access to unauthorized services.
There is no dedicated patch for CVE-2004-1653, but users should upgrade to a later version of OpenSSH that addresses this vulnerability.