First published: Tue Dec 02 2014(Updated: )
IssueDescription: In a Kerberos environment, OpenSSH allows remote, authenticated users to log in as another user if they are listed in a ~/.k5users file of that other user. This unexpectedly alters the system security policy, as expressed through the ~/.k5users file, because previously, users would have to log in locally, potentially requiring different forms of authentication, before they could use the ksu command to switch users.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | ||
Red Hat Enterprise Linux | =7.0 | |
Fedora | =7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9278 has been classified as a moderate severity vulnerability.
To fix CVE-2014-9278, ensure that proper controls are in place for the ~/.k5users file and limit user permissions accordingly.
CVE-2014-9278 affects users of OpenSSH in a Kerberos environment.
The impact of CVE-2014-9278 allows remote authenticated users to impersonate other users inappropriately.
Yes, a patch for CVE-2014-9278 was included in subsequent OpenSSH releases.