Access Restriction Bypass Affecting pam_ssh_agent_auth package, versions <0:0.9.3-5.8.44.amzn1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-AMZN201803-PAMSSHAGENTAUTH-1688882
- published 27 Sep 2021
- disclosed 3 Aug 2015
Introduced: 3 Aug 2015
CVE-2015-5352 Open this link in a new tabHow to fix?
Upgrade Amazon-Linux:2018.03 pam_ssh_agent_auth to version 0:0.9.3-5.8.44.amzn1 or higher.
This issue was patched in ALAS-2015-568.
NVD Description
Note: Versions mentioned in the description apply only to the upstream pam_ssh_agent_auth package and not the pam_ssh_agent_auth package as distributed by Amazon-Linux.
See How to fix? for Amazon-Linux:2018.03 relevant fixed versions and status.
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
References
- http://www.securityfocus.com/bid/75525
- https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d
- https://security.netapp.com/advisory/ntap-20181023-0001/
- http://www.openssh.com/txt/release-6.9
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5352
- https://security.gentoo.org/glsa/201512-04
- http://openwall.com/lists/oss-security/2015/07/01/10
- https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2016-0741.html
- http://www.securitytracker.com/id/1032797
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html
- http://www.ubuntu.com/usn/USN-2710-1
- http://www.ubuntu.com/usn/USN-2710-2
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf