First published: Fri May 19 2017(Updated: )
Dropbear before 2017.75 might allow local users to read certain files as root, if the file has the authorized_keys file format with a command= option. This occurs because ~/.ssh/authorized_keys is read with root privileges and symlinks are followed.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dropbear SSH | <2017.75 | |
Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9079 is considered to have a medium severity rating due to potential unauthorized access to sensitive files.
To fix CVE-2017-9079, upgrade Dropbear SSH to version 2017.75 or later.
CVE-2017-9079 affects local users of Dropbear SSH versions prior to 2017.75 and users of Debian 8.0.
CVE-2017-9079 allows local users to read certain files as root, which can lead to exposure of sensitive information.
Systems running Dropbear SSH before version 2017.75 and Debian GNU/Linux 8.0 are vulnerable to CVE-2017-9079.