First published: Tue Mar 18 2014(Updated: )
sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openssh | 1:8.4p1-5+deb11u3 1:9.2p1-2+deb12u2 1:9.2p1-2+deb12u3 1:9.8p1-2 1:9.8p1-3 | |
Oracle Communications User Data Repository | =10.0.1 | |
OpenSSH | <=6.5 | |
OpenSSH | =6.0 | |
OpenSSH | =6.1 | |
OpenSSH | =6.2 | |
OpenSSH | =6.3 | |
OpenSSH | =6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2532 has a medium severity rating as it allows attackers to bypass intended environment restrictions.
To fix CVE-2014-2532, upgrade OpenSSH to version 6.6 or later where the wildcard issue has been addressed.
CVE-2014-2532 affects OpenSSH versions prior to 6.6, including 6.0 through 6.5.
CVE-2014-2532 does not directly allow remote code execution, but it can facilitate unauthorized environment variable manipulation.
CVE-2014-2532 affects OpenSSH installations across multiple operating systems, including Debian and Oracle systems.