|
|
| |
|
| |
openssh: code execution
| Package(s): | openssh |
CVE #(s): | CVE-2012-5536
|
| Created: | February 21, 2013 |
Updated: | March 11, 2013 |
| Description: |
From the Red Hat advisory:
Due to the way the pam_ssh_agent_auth PAM module was built in Red Hat
Enterprise Linux 6, the glibc's error() function was called rather than the
intended error() function in pam_ssh_agent_auth to report errors. As these
two functions expect different arguments, it was possible for an attacker
to cause an application using pam_ssh_agent_auth to crash, disclose
portions of its memory or, potentially, execute arbitrary code. |
| Alerts: |
|
( Log in to post comments)
|
|
|