6
CVSSv2

CVE-2013-4548

Published: 08/11/2013 Updated: 09/10/2019
CVSS v2 Base Score: 6 | Impact Score: 6.4 | Exploitability Score: 6.8
VMScore: 534
Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P

Vulnerability Summary

The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH 6.2 and 6.3, when an AES-GCM cipher is used, does not properly initialize memory for a MAC context data structure, which allows remote authenticated users to bypass intended ForceCommand and login-shell restrictions via packet data that provides a crafted callback address.

Vulnerable Product Search on Vulmon Subscribe to Product

openbsd openssh 6.3

openbsd openssh 6.2

Vendor Advisories

Debian Bug report logs - #729029 openssh: CVE-2013-4548: Memory corruption in AES-GCM support Package: openssh; Maintainer for openssh is Debian OpenSSH Maintainers <debian-ssh@listsdebianorg>; Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Fri, 8 Nov 2013 05:48:02 UTC Severity: grave Tags: fixed-upstream, ...
OpenSSH could be made to run programs if it received specially crafted network traffic from an authenticated user ...