ID |
CVE-2007-3102
|
Summary |
Unspecified vulnerability in the linux_audit_record_event function in OpenSSH 4.3p2, as used on Fedora Core 6 and possibly other systems, allows remote attackers to write arbitrary characters to an audit log via a crafted username. NOTE: some of these details are obtained from third party information. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 4.3 (as of 11-10-2017 - 01:32) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-noinfo |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
MEDIUM |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
PARTIAL |
NONE |
|
cvss-vector
via4
|
AV:N/AC:M/Au:N/C:N/I:P/A:N
|
oval
via4
|
accepted | 2013-04-29T04:11:40.524-04:00 | class | vulnerability | contributors | name | Aharon Chernin | organization | SCAP.com, LLC |
name | Dragos Prisaca | organization | G2, Inc. |
| definition_extensions | comment | The operating system installed on the system is Red Hat Enterprise Linux 4 | oval | oval:org.mitre.oval:def:11831 |
comment | CentOS Linux 4.x | oval | oval:org.mitre.oval:def:16636 |
comment | Oracle Linux 4.x | oval | oval:org.mitre.oval:def:15990 |
comment | The operating system installed on the system is Red Hat Enterprise Linux 5 | oval | oval:org.mitre.oval:def:11414 |
comment | The operating system installed on the system is CentOS Linux 5.x | oval | oval:org.mitre.oval:def:15802 |
comment | Oracle Linux 5.x | oval | oval:org.mitre.oval:def:15459 |
| description | Unspecified vulnerability in the linux_audit_record_event function in OpenSSH 4.3p2, as used on Fedora Core 6 and possibly other systems, allows remote attackers to write arbitrary characters to an audit log via a crafted username. NOTE: some of these details are obtained from third party information. | family | unix | id | oval:org.mitre.oval:def:11124 | status | accepted | submitted | 2010-07-09T03:56:16-04:00 | title | Unspecified vulnerability in the linux_audit_record_event function in OpenSSH 4.3p2, as used on Fedora Core 6 and possibly other systems, allows remote attackers to write arbitrary characters to an audit log via a crafted username. NOTE: some of these details are obtained from third party information. | version | 31 |
|
redhat
via4
|
advisories | bugzilla | id | 243204 | title | CVE-2007-3102 audit logging of failed logins |
| oval | OR | comment | Red Hat Enterprise Linux must be installed | oval | oval:com.redhat.rhba:tst:20070304026 |
AND | comment | Red Hat Enterprise Linux 5 is installed | oval | oval:com.redhat.rhba:tst:20070331005 |
OR | AND | comment | openssh is earlier than 0:4.3p2-24.el5 | oval | oval:com.redhat.rhsa:tst:20070540001 |
comment | openssh is signed with Red Hat redhatrelease key | oval | oval:com.redhat.rhsa:tst:20070540002 |
|
AND | comment | openssh-askpass is earlier than 0:4.3p2-24.el5 | oval | oval:com.redhat.rhsa:tst:20070540003 |
comment | openssh-askpass is signed with Red Hat redhatrelease key | oval | oval:com.redhat.rhsa:tst:20070540004 |
|
AND | comment | openssh-clients is earlier than 0:4.3p2-24.el5 | oval | oval:com.redhat.rhsa:tst:20070540005 |
comment | openssh-clients is signed with Red Hat redhatrelease key | oval | oval:com.redhat.rhsa:tst:20070540006 |
|
AND | comment | openssh-server is earlier than 0:4.3p2-24.el5 | oval | oval:com.redhat.rhsa:tst:20070540007 |
comment | openssh-server is signed with Red Hat redhatrelease key | oval | oval:com.redhat.rhsa:tst:20070540008 |
|
|
|
|
| rhsa | id | RHSA-2007:0540 | released | 2007-11-07 | severity | Moderate | title | RHSA-2007:0540: openssh security and bug fix update (Moderate) |
|
bugzilla | id | 1618305 | title | CVE-2007-1716 security flaw |
| oval | OR | comment | Red Hat Enterprise Linux must be installed | oval | oval:com.redhat.rhba:tst:20070304026 |
AND | comment | Red Hat Enterprise Linux 5 is installed | oval | oval:com.redhat.rhba:tst:20070331005 |
OR | AND | comment | pam is earlier than 0:0.99.6.2-3.26.el5 | oval | oval:com.redhat.rhsa:tst:20070555001 |
comment | pam is signed with Red Hat redhatrelease key | oval | oval:com.redhat.rhsa:tst:20070555002 |
|
AND | comment | pam-devel is earlier than 0:0.99.6.2-3.26.el5 | oval | oval:com.redhat.rhsa:tst:20070555003 |
comment | pam-devel is signed with Red Hat redhatrelease key | oval | oval:com.redhat.rhsa:tst:20070555004 |
|
|
|
|
| rhsa | id | RHSA-2007:0555 | released | 2007-11-07 | severity | Moderate | title | RHSA-2007:0555: pam security, bug fix, and enhancement update (Moderate) |
|
bugzilla | id | 243204 | title | CVE-2007-3102 audit logging of failed logins |
| oval | OR | comment | Red Hat Enterprise Linux must be installed | oval | oval:com.redhat.rhba:tst:20070304026 |
AND | comment | Red Hat Enterprise Linux 4 is installed | oval | oval:com.redhat.rhba:tst:20070304025 |
OR | AND | comment | openssh is earlier than 0:3.9p1-8.RHEL4.24 | oval | oval:com.redhat.rhsa:tst:20070703001 |
comment | openssh is signed with Red Hat master key | oval | oval:com.redhat.rhsa:tst:20060044002 |
|
AND | comment | openssh-askpass is earlier than 0:3.9p1-8.RHEL4.24 | oval | oval:com.redhat.rhsa:tst:20070703003 |
comment | openssh-askpass is signed with Red Hat master key | oval | oval:com.redhat.rhsa:tst:20060044004 |
|
AND | comment | openssh-askpass-gnome is earlier than 0:3.9p1-8.RHEL4.24 | oval | oval:com.redhat.rhsa:tst:20070703005 |
comment | openssh-askpass-gnome is signed with Red Hat master key | oval | oval:com.redhat.rhsa:tst:20060044006 |
|
AND | comment | openssh-clients is earlier than 0:3.9p1-8.RHEL4.24 | oval | oval:com.redhat.rhsa:tst:20070703007 |
comment | openssh-clients is signed with Red Hat master key | oval | oval:com.redhat.rhsa:tst:20060044008 |
|
AND | comment | openssh-server is earlier than 0:3.9p1-8.RHEL4.24 | oval | oval:com.redhat.rhsa:tst:20070703009 |
comment | openssh-server is signed with Red Hat master key | oval | oval:com.redhat.rhsa:tst:20060044010 |
|
|
|
|
| rhsa | id | RHSA-2007:0703 | released | 2007-11-15 | severity | Moderate | title | RHSA-2007:0703: openssh security and bug fix update (Moderate) |
|
bugzilla | id | 1618305 | title | CVE-2007-1716 security flaw |
| oval | OR | comment | Red Hat Enterprise Linux must be installed | oval | oval:com.redhat.rhba:tst:20070304026 |
AND | comment | Red Hat Enterprise Linux 4 is installed | oval | oval:com.redhat.rhba:tst:20070304025 |
OR | AND | comment | pam is earlier than 0:0.77-66.23 | oval | oval:com.redhat.rhsa:tst:20070737001 |
comment | pam is signed with Red Hat master key | oval | oval:com.redhat.rhsa:tst:20070737002 |
|
AND | comment | pam-devel is earlier than 0:0.77-66.23 | oval | oval:com.redhat.rhsa:tst:20070737003 |
comment | pam-devel is signed with Red Hat master key | oval | oval:com.redhat.rhsa:tst:20070737004 |
|
|
|
|
| rhsa | id | RHSA-2007:0737 | released | 2007-11-15 | severity | Moderate | title | RHSA-2007:0737: pam security, bug fix, and enhancement update (Moderate) |
|
| rpms | - openssh-0:4.3p2-24.el5
- openssh-askpass-0:4.3p2-24.el5
- openssh-clients-0:4.3p2-24.el5
- openssh-debuginfo-0:4.3p2-24.el5
- openssh-server-0:4.3p2-24.el5
- pam-0:0.99.6.2-3.26.el5
- pam-debuginfo-0:0.99.6.2-3.26.el5
- pam-devel-0:0.99.6.2-3.26.el5
- openssh-0:3.9p1-8.RHEL4.24
- openssh-askpass-0:3.9p1-8.RHEL4.24
- openssh-askpass-gnome-0:3.9p1-8.RHEL4.24
- openssh-clients-0:3.9p1-8.RHEL4.24
- openssh-debuginfo-0:3.9p1-8.RHEL4.24
- openssh-server-0:3.9p1-8.RHEL4.24
- pam-0:0.77-66.23
- pam-debuginfo-0:0.77-66.23
- pam-devel-0:0.77-66.23
|
|
refmap
via4
|
|
Last major update |
11-10-2017 - 01:32 |
Published |
18-10-2007 - 20:17 |
Last modified |
11-10-2017 - 01:32 |