Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2015-6563

Description

The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.

POC

Reference

- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html

- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html

- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html

- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf

Github

- https://github.com/ARPSyndicate/cvemon

- https://github.com/CyCognito/manual-detection

- https://github.com/Live-Hack-CVE/CVE-2015-6563

- https://github.com/Maribel0370/Nebula-io

- https://github.com/bigb0x/CVE-2024-6387

- https://github.com/bigb0x/OpenSSH-Scanner

- https://github.com/edsonjt81/https-github.com-gotr00t0day-OpenSSH-Scanner

- https://github.com/lekctut/sdb-hw-13-01

- https://github.com/pedr0alencar/vlab-metasploitable2

- https://github.com/ryanalieh/openSSH-scanner

- https://github.com/vshaliii/DC-1-Vulnhub-Walkthrough

- https://github.com/vshaliii/DC-2-Vulnhub-Walkthrough