First published: Wed Apr 02 2008(Updated: )
OpenSSH 4.4 up to versions before 4.9 allows remote authenticated users to bypass the sshd_config ForceCommand directive by modifying the .ssh/rc session file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | =4.8 | |
OpenSSH | =4.7 | |
OpenSSH | =4.4 | |
OpenSSH | =4.5 | |
OpenSSH | =4.4p1 | |
OpenSSH | =4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1657 has a moderate severity level as it allows a remote authenticated user to bypass security configurations.
To fix CVE-2008-1657, upgrade OpenSSH to version 4.9 or later to ensure the bypass is eliminated.
CVE-2008-1657 affects OpenSSH versions 4.4 to 4.8, including 4.5, 4.6, 4.7, and 4.8.
The ForceCommand directive is intended to restrict the commands a user can run, but it can be bypassed due to this vulnerability.
CVE-2008-1657 can be exploited by remote authenticated users with access to the affected OpenSSH versions.