First published: Mon Aug 24 2015(Updated: )
The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | <=6.9 | |
Apple iOS and macOS | <=10.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6563 is classified as a high severity vulnerability due to its potential to allow local users to conduct impersonation attacks.
To fix CVE-2015-6563, update your OpenSSH installation to version 7.0 or later to mitigate the vulnerability.
CVE-2015-6563 affects OpenSSH versions prior to 7.0 on non-OpenBSD platforms, including macOS Yosemite up to version 10.11.0.
CVE-2015-6563 can facilitate impersonation attacks by allowing local users to leverage SSH login access.
CVE-2015-6563 is a local vulnerability as it requires local user access to exploit the flaw.