Vulnerability Details : CVE-2009-2904
A certain Red Hat modification to the ChrootDirectory feature in OpenSSH 4.8, as used in sshd in OpenSSH 4.3 in Red Hat Enterprise Linux (RHEL) 5.4 and Fedora 11, allows local users to gain privileges via hard links to setuid programs that use configuration files within the chroot directory, related to requirements for directory ownership.
Exploit prediction scoring system (EPSS) score for CVE-2009-2904
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2009-2904
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
NIST |
CWE ids for CVE-2009-2904
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-2904
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9862
-
https://bugzilla.redhat.com/show_bug.cgi?id=522141
-
http://www.vupen.com/english/advisories/2010/0528
Webmail: access your OVH emails on ovhcloud.com | OVHcloud
-
http://lists.vmware.com/pipermail/security-announce/2010/000082.html
502 Bad Gateway
-
https://rhn.redhat.com/errata/RHSA-2009-1470.html
Vendor Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2010-March/038214.html
-
http://www.securityfocus.com/bid/36552
Products affected by CVE-2009-2904
- cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:4.8:*:*:*:*:*:*:*