First published: Wed Sep 09 2009(Updated: )
A certain Red Hat modification to the ChrootDirectory feature in OpenSSH 4.8, as used in sshd in OpenSSH 4.3 in Red Hat Enterprise Linux (RHEL) 5.4 and Fedora 11, allows local users to gain privileges via hard links to setuid programs that use configuration files within the chroot directory, related to requirements for directory ownership.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | =4.3 | |
OpenSSH | =4.8 | |
Fedora | =11 | |
Red Hat Enterprise Linux | =5 | |
redhat enterprise Linux desktop | =5 | |
redhat enterprise Linux eus | =5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2904 has a medium severity rating, as it allows local users to escalate privileges.
To fix CVE-2009-2904, update OpenSSH to a version that does not include the vulnerable ChrootDirectory modification.
CVE-2009-2904 affects local users of Red Hat Enterprise Linux 5.4 and OpenSSH versions 4.3 and 4.8.
Exploitation of CVE-2009-2904 could allow an attacker to gain elevated privileges on the affected system.
The vulnerable software versions for CVE-2009-2904 are OpenSSH 4.3 and OpenSSH 4.8 as modified by Red Hat.