Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.871696
Category:Red Hat Local Security Checks
Title:RedHat Update for openssh RHSA-2016:2588-02
Summary:The remote host is missing an update for the 'openssh'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'openssh'
package(s) announced via the referenced advisory.

Vulnerability Insight:
OpenSSH is an SSH protocol implementation
supported by a number of Linux, UNIX, and similar operating systems. It includes
the core files necessary for both the OpenSSH client and server.

Security Fix(es):

* It was discovered that the OpenSSH sshd daemon fetched PAM environment
settings before running the login program. In configurations with
UseLogin=yes and the pam_env PAM module configured to read user environment
settings, a local user could use this flaw to execute arbitrary code as
root. (CVE-2015-8325)

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.3 Release Notes linked from the References section.

Affected Software/OS:
openssh on Red Hat Enterprise Linux Server (v. 7)

Solution:
Please Install the Updated Packages.

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-8325
BugTraq ID: 86187
http://www.securityfocus.com/bid/86187
Debian Security Information: DSA-3550 (Google Search)
http://www.debian.org/security/2016/dsa-3550
https://security.gentoo.org/glsa/201612-18
RedHat Security Advisories: RHSA-2016:2588
http://rhn.redhat.com/errata/RHSA-2016-2588.html
RedHat Security Advisories: RHSA-2017:0641
http://rhn.redhat.com/errata/RHSA-2017-0641.html
http://www.securitytracker.com/id/1036487
CopyrightCopyright (C) 2016 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.