Ask the Community
Groups
CVE-2015-6564 openssh: Use-after-free bug with PAM support - Connect IT Community | Kaseya
<main> <article class="userContent"> <h3 data-id="cve-id"><strong>CVE ID</strong></h3> <p>CVE-2015-6564</p> <h3 data-id="description"><strong>DESCRIPTION</strong></h3> <p>A use-after-free flaw was found in OpenSSH. An attacker able to fully compromise a non-privileged pre-authentication process using a different flaw could possibly cause sshd to crash or execute arbitrary code with root privileges.<br><br> </p> <h3 data-id="resolution"><strong>RESOLUTION</strong></h3> <p>Unitrends Risk Assessment: None with security updates 4/26/17 or later<br>Resolution:<br>Fixed in openssh-5.3p1-117.el6 and later. </p> <h3 data-id="link-to-advisories"><strong>LINK TO ADVISORIES</strong></h3> <p></p> <ul><li><a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2015-6564%250D%250Ahttps%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2FCVE-2015-6564">https://nvd.nist.gov/vuln/detail/CVE-2015-6564 https://access.redhat.com/security/cve/CVE-2015-6564</a></li></ul> </article> </main>