Vulnerability   
Search   
    Search 187964 CVE descriptions
and 85075 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.150230
Category:Policy
Title:Linux: SSH GatewayPorts
Summary:sshd reads configuration data from /etc/ssh/sshd_config (or the;file specified with -f on the command line). The file contains keyword-argument pairs, one per line.;Lines starting with '#' and empty lines are interpreted as comments. Arguments may optionally be;enclosed in double quotes in order to represent arguments containing spaces.;; - GatewayPorts: Specifies whether remote hosts are allowed to connect to ports forwarded for the;client. By default, sshd binds remote port forwardings to the loopback address. This prevents other;remote hosts from connecting to forwarded ports. GatewayPorts can be used to specify that sshd;should allow remote port forwardings to bind to non-loopback addresses, thus allowing other hosts to;connect. The argument may be 'no' to force remote port forwardings to be available to the local host;only, 'yes' to force remote port forwardings to bind to the wildcard address, or 'clientspecified';to allow the client to select the address to which the forwarding is bound.
Description:Summary:
sshd reads configuration data from /etc/ssh/sshd_config (or the
file specified with -f on the command line). The file contains keyword-argument pairs, one per line.
Lines starting with '#' and empty lines are interpreted as comments. Arguments may optionally be
enclosed in double quotes in order to represent arguments containing spaces.

- GatewayPorts: Specifies whether remote hosts are allowed to connect to ports forwarded for the
client. By default, sshd binds remote port forwardings to the loopback address. This prevents other
remote hosts from connecting to forwarded ports. GatewayPorts can be used to specify that sshd
should allow remote port forwardings to bind to non-loopback addresses, thus allowing other hosts to
connect. The argument may be 'no' to force remote port forwardings to be available to the local host
only, 'yes' to force remote port forwardings to bind to the wildcard address, or 'clientspecified'
to allow the client to select the address to which the forwarding is bound.

CVSS Score:
0.0

CVSS Vector:
AV:L/AC:H/Au:S/C:N/I:N/A:N

CopyrightCopyright (C) 2020 Greenbone Networks GmbH

This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2020 E-Soft Inc. All rights reserved.