Vulnerability   
Search   
    Search 187964 CVE descriptions
and 85075 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.150226
Category:Policy
Title:Linux: SSH StrictModes
Summary:sshd reads configuration data from /etc/ssh/sshd_config (or the;file specified with -f on the command line). The file contains keyword-argument pairs, one per line.;Lines starting with '#' and empty lines are interpreted as comments. Arguments may optionally be;enclosed in double quotes in order to represent arguments containing spaces.;; - StrictModes: Specifies whether sshd should check file modes and ownership of the user's files and;home directory before accepting login. This is normally desirable because novices sometimes;accidentally leave their directory or files world-writable.
Description:Summary:
sshd reads configuration data from /etc/ssh/sshd_config (or the
file specified with -f on the command line). The file contains keyword-argument pairs, one per line.
Lines starting with '#' and empty lines are interpreted as comments. Arguments may optionally be
enclosed in double quotes in order to represent arguments containing spaces.

- StrictModes: Specifies whether sshd should check file modes and ownership of the user's files and
home directory before accepting login. This is normally desirable because novices sometimes
accidentally leave their directory or files world-writable.

CVSS Score:
0.0

CVSS Vector:
AV:L/AC:H/Au:S/C:N/I:N/A:N

CopyrightCopyright (C) 2020 Greenbone Networks GmbH

This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2020 E-Soft Inc. All rights reserved.