First published: Fri Jul 18 2008(Updated: )
sshd in OpenSSH 4 on Debian GNU/Linux, and the 20070303 OpenSSH snapshot, allows remote authenticated users to obtain access to arbitrary SELinux roles by appending a :/ (colon slash) sequence, followed by the role name, to the username.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | =4.0 | |
Debian Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3234 is classified as a high severity vulnerability due to its ability to allow remote authenticated users to access arbitrary SELinux roles.
To fix CVE-2008-3234, upgrade to a patched version of OpenSSH or implement appropriate user role restrictions to prevent exploitation.
CVE-2008-3234 affects users of OpenSSH version 4.0 on Debian GNU/Linux systems.
CVE-2008-3234 facilitates privilege escalation attacks by allowing users to gain access to unauthorized SELinux roles.
CVE-2008-3234 is not present in OpenSSH versions released after 4.0, as subsequent versions have patched this vulnerability.