First published: Thu Oct 18 2007(Updated: )
Unspecified vulnerability in the linux_audit_record_event function in OpenSSH 4.3p2, as used on Fedora Core 6 and possibly other systems, allows remote attackers to write arbitrary characters to an audit log via a crafted username. NOTE: some of these details are obtained from third party information.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora Core | =6 | |
OpenSSH | =4.3p2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3102 is considered a moderate severity vulnerability due to its potential for misuse in logging unauthorized information.
To resolve CVE-2007-3102, consider upgrading to OpenSSH version 4.3p3 or later.
CVE-2007-3102 affects OpenSSH version 4.3p2, particularly on Fedora Core 6.
CVE-2007-3102 allows remote attackers to write arbitrary characters to an audit log, potentially to obfuscate malicious activities.
A temporary workaround for CVE-2007-3102 may involve limiting user permissions and carefully monitoring log files.