CVE-2012-0814

CVE information

Published

10 years ago

Last Modified

4 years ago

CVSSv2.0 Severity

Low

Impact Analysis

Description

The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory..

CVSSv2.0 Score

Severity
Low
Base Score
3.5/10
Exploit Score
6.8/10
Access Vector
Network
Access Complexity
Medium
Authentication Required
Single
Impact Score
2.9/10
Confidentiality Impact
Partial
Availability Impact
None
Integrity Impact
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:1.5.8:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:4.8:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:4.7:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:5.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:4.9:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:1.5.7:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:5.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:5.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:5.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:1.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:1.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:4.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*
  Yes
- -

Get started for free to scan for vulnerabilities

Companies of all sizes use Mageni to scan their assets for vulnerabilities. Mageni is free for 7-days then $39 USD Monthly regardless of how many IPs, scans, deployments or users you have. Cancel at Anytime and 7-days Money-Back Guarantee. Developed and supported by certified CompTIA PenTest+ professionals. Mageni contributes 1% of your subscription to removing CO₂ from the atmosphere.

Get Started For Free
App screenshot