CVE-2014-2532

sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
References
Link Resource
http://advisories.mageia.org/MGASA-2014-0143.html
http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html
http://marc.info/?l=bugtraq&m=141576985122836&w=2
http://marc.info/?l=bugtraq&m=141576985122836&w=2
http://marc.info/?l=openbsd-security-announce&m=139492048027313&w=2
http://rhn.redhat.com/errata/RHSA-2014-1552.html
http://secunia.com/advisories/57488
http://secunia.com/advisories/57574
http://secunia.com/advisories/59313
http://secunia.com/advisories/59855
http://www.debian.org/security/2014/dsa-2894
http://www.mandriva.com/security/advisories?name=MDVSA-2014:068
http://www.mandriva.com/security/advisories?name=MDVSA-2015:095
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.securityfocus.com/bid/66355
http://www.securitytracker.com/id/1029925
http://www.ubuntu.com/usn/USN-2155-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/91986
https://support.apple.com/HT205267
http://advisories.mageia.org/MGASA-2014-0143.html
http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html
http://marc.info/?l=bugtraq&m=141576985122836&w=2
http://marc.info/?l=bugtraq&m=141576985122836&w=2
http://marc.info/?l=openbsd-security-announce&m=139492048027313&w=2
http://rhn.redhat.com/errata/RHSA-2014-1552.html
http://secunia.com/advisories/57488
http://secunia.com/advisories/57574
http://secunia.com/advisories/59313
http://secunia.com/advisories/59855
http://www.debian.org/security/2014/dsa-2894
http://www.mandriva.com/security/advisories?name=MDVSA-2014:068
http://www.mandriva.com/security/advisories?name=MDVSA-2015:095
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.securityfocus.com/bid/66355
http://www.securitytracker.com/id/1029925
http://www.ubuntu.com/usn/USN-2155-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/91986
https://support.apple.com/HT205267
Configurations

Configuration 1 (hide)

cpe:2.3:a:oracle:communications_user_data_repository:10.0.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:6.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:6.2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:6.3:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:6.4:*:*:*:*:*:*:*

History

No history.

Information

Published : 2014-03-18 05:18

Updated : 2025-04-12 10:46


NVD link : CVE-2014-2532

Mitre link : CVE-2014-2532

CVE.ORG link : CVE-2014-2532


JSON object : View

Products Affected

openbsd

  • openssh

oracle

  • communications_user_data_repository
CWE
CWE-264

Permissions, Privileges, and Access Controls