CVE-2014-2532

sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.9 MEDIUM
NETWORK
HIGH
LOW
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 45%
VendorProductVersion
oraclecommunications_user_data_repository
10.0.1
openbsdopenssh
𝑥
≤ 6.5
openbsdopenssh
6.0
openbsdopenssh
6.1
openbsdopenssh
6.2
openbsdopenssh
6.3
openbsdopenssh
6.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssh
bullseye (security)
1:8.4p1-5+deb11u3
fixed
bullseye
1:8.4p1-5+deb11u3
fixed
bookworm
1:9.2p1-2+deb12u3
fixed
bookworm (security)
1:9.2p1-2+deb12u3
fixed
sid
1:9.9p1-3
fixed
trixie
1:9.9p1-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openssh
saucy
Fixed 1:6.2p2-6ubuntu0.2
released
quantal
Fixed 1:6.0p1-3ubuntu1.1
released
precise
Fixed 1:5.9p1-5ubuntu1.2
released
lucid
Fixed 1:5.3p1-3ubuntu7.1
released
Common Weakness Enumeration
References