CVE-2005-2798

sshd in OpenSSH before 4.2, when GSSAPIDelegateCredentials is enabled, allows GSSAPI credentials to be delegated to clients who log in using non-GSSAPI methods, which could cause those credentials to be exposed to untrusted users or hosts.
References
Link Resource
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.53/SCOSA-2005.53.txt
http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html
http://secunia.com/advisories/16686 Patch Vendor Advisory
http://secunia.com/advisories/17077
http://secunia.com/advisories/17245
http://secunia.com/advisories/18010
http://secunia.com/advisories/18406
http://secunia.com/advisories/18507
http://secunia.com/advisories/18661
http://secunia.com/advisories/18717
http://securitytracker.com/id?1014845
http://support.avaya.com/elmodocs2/security/ASA-2006-016.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-033.htm
http://www.mandriva.com/security/advisories?name=MDKSA-2005:172
http://www.mindrot.org/pipermail/openssh-unix-announce/2005-September/000083.html
http://www.osvdb.org/19141
http://www.redhat.com/support/errata/RHSA-2005-527.html
http://www.securityfocus.com/archive/1/421411/100/0/threaded
http://www.securityfocus.com/archive/1/421411/100/0/threaded
http://www.securityfocus.com/bid/14729
http://www.vupen.com/english/advisories/2006/0144
https://exchange.xforce.ibmcloud.com/vulnerabilities/24064
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1345
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1566
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9717
https://usn.ubuntu.com/209-1/
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.53/SCOSA-2005.53.txt
http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html
http://secunia.com/advisories/16686 Patch Vendor Advisory
http://secunia.com/advisories/17077
http://secunia.com/advisories/17245
http://secunia.com/advisories/18010
http://secunia.com/advisories/18406
http://secunia.com/advisories/18507
http://secunia.com/advisories/18661
http://secunia.com/advisories/18717
http://securitytracker.com/id?1014845
http://support.avaya.com/elmodocs2/security/ASA-2006-016.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-033.htm
http://www.mandriva.com/security/advisories?name=MDKSA-2005:172
http://www.mindrot.org/pipermail/openssh-unix-announce/2005-September/000083.html
http://www.osvdb.org/19141
http://www.redhat.com/support/errata/RHSA-2005-527.html
http://www.securityfocus.com/archive/1/421411/100/0/threaded
http://www.securityfocus.com/archive/1/421411/100/0/threaded
http://www.securityfocus.com/bid/14729
http://www.vupen.com/english/advisories/2006/0144
https://exchange.xforce.ibmcloud.com/vulnerabilities/24064
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1345
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1566
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9717
https://usn.ubuntu.com/209-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2005-09-06 17:03

Updated : 2025-04-03 01:03


NVD link : CVE-2005-2798

Mitre link : CVE-2005-2798

CVE.ORG link : CVE-2005-2798


JSON object : View

Products Affected

openbsd

  • openssh