vendor:
FreeBSD
by:
SecurityFocus
7.2
CVSS
HIGH
Privilege Escalation
264
CWE
Product Name: FreeBSD
Affected Version From: FreeBSD 4.0
Affected Version To: FreeBSD 4.5
Patch Exists: NO
Related CWE: N/A
CPE: o:freebsd:freebsd
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: FreeBSD
2002
FreeBSD SSH Privilege Escalation Vulnerability
A vulnerability in FreeBSD allows a user with access to a system via SSH to gain access to privileged information. This is caused by a mixture of problems with login capabilities, the FreeBSD OpenSSH port not dropping privileges during part of the login process, and login not dropping privileges at the correct time. A user could make a malicious entry in the .login.conf file in their home directoy, and read files such as the master.passwd file and gain access to encrypted passwords on the system.
Mitigation:
To mitigate this vulnerability, users should ensure that the .login.conf file in their home directory does not contain malicious entries.