First published: Tue Sep 06 2005(Updated: )
OpenSSH 4.0, and other versions before 4.2, does not properly handle dynamic port forwarding ("-D" option) when a listen address is not provided, which may cause OpenSSH to enable the GatewayPorts functionality.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2797 has a moderate severity rating due to the potential exposure of port forwarding functionality.
To fix CVE-2005-2797, upgrade OpenSSH to version 4.2 or later to ensure proper dynamic port forwarding behavior.
CVE-2005-2797 exploits the improper handling of dynamic port forwarding without specifying a listen address.
OpenSSH versions 4.0 and older are affected by CVE-2005-2797.
CVE-2005-2797 may inadvertently enable GatewayPorts functionality, potentially leading to unauthorized access.