Ask the Community
Groups
CVE-2015-6563: openssh: Privilege separation weakness - Connect IT Community | Kaseya
<main> <article class="userContent"> <h3 data-id="cve-id"><strong>CVE ID</strong></h3> <p>CVE-2015-6563</p> <h3 data-id="description"><strong>DESCRIPTION</strong></h3> <p>A flaw was found in the way OpenSSH handled PAM authentication when using privilege separation. An attacker with valid credentials on the system and able to fully compromise a non-privileged pre-authentication process using a different flaw could use this flaw to authenticate as other users.</p> <h3 data-id="resolution"><strong>RESOLUTION</strong></h3> <p>Unitrends Risk Assessment: None with security updates 4/26/17 or later<br>Resolution:<br>Fixed in openssh-5.3p1-117.el6 and later. </p> <h3 data-id="link-to-advisories"><strong>LINK TO ADVISORIES</strong></h3> <p></p> <ul><li><a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2015-6563">https://nvd.nist.gov/vuln/detail/CVE-2015-6563</a></li> <li><a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2FCVE-2015-6563"> https://access.redhat.com/security/cve/CVE-2015-6563</a></li> </ul> </article> </main>