Ask the Community
Groups
CVE-2016-3115: openssh: bypass SSH restrictions - Connect IT Community | Kaseya
<main> <article class="userContent"> <h3 data-id="summary"><strong>SUMMARY</strong></h3> <p>An authorized SSH client with restricted access can potentially bypass the restrictions.</p> <h3 data-id="cve-id"><strong>CVE ID</strong></h3> <p>CVE-2016-3115</p> <h3 data-id="description"><strong>DESCRIPTION</strong></h3> <p>CVE-2016-3115: openssh: bypass SSH restrictions<br><br>It was discovered that the OpenSSH server did not sanitize data received in requests to enable X11 forwarding. An authenticated client with restricted SSH access could possibly use this flaw to bypass intended restrictions.<br> <br>Unitrends Risk Assessment: None<br>The Unitrends system only has one authenticated SSH user, root. So there are no restricted users with SSH access to exploit this issue.<br><br> </p> <h3 data-id="resolution"><strong>RESOLUTION</strong></h3> <p><br>No action is required. <br>For CentOS6, this could also be resolved in an updated openssh-5.3p1-114.el6 rpm from Red Hat.<br> <br> </p> <h3 data-id="link-to-advisories"><strong>LINK TO ADVISORIES</strong></h3> <p></p> <ul><li><a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Fweb.nvd.nist.gov%2Fview%2Fvuln%2Fdetail%3FvulnId%3DCVE-2016-3115%250D%250Ahttps%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2Fcve-2016-3115">https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3115 https://access.redhat.com/security/cve/cve-2016-3115</a></li></ul> </article> </main>