6
CVSSv2

CVE-2013-4548

Published: 08/11/2013 Updated: 09/10/2019
CVSS v2 Base Score: 6 | Impact Score: 6.4 | Exploitability Score: 6.8
VMScore: 534
Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P

Vulnerability Summary

The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH 6.2 and 6.3, when an AES-GCM cipher is used, does not properly initialize memory for a MAC context data structure, which allows remote authenticated users to bypass intended ForceCommand and login-shell restrictions via packet data that provides a crafted callback address.

Vulnerable Product Search on Vulmon Subscribe to Product

openbsd openssh 6.3

openbsd openssh 6.2

Vendor Advisories

OpenSSH could be made to run programs if it received specially crafted network traffic from an authenticated user ...
Debian Bug report logs - #729029 openssh: CVE-2013-4548: Memory corruption in AES-GCM support Package: openssh; Maintainer for openssh is Debian OpenSSH Maintainers <debian-ssh@listsdebianorg>; Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Fri, 8 Nov 2013 05:48:02 UTC Severity: grave Tags: fixed-upstream, ...