CVE-2015-6565

Impact:
Low
Public Date:
2015-08-11
Bugzilla:
1252861: CVE-2015-6565 openssh: Incorrectly set TTYs to be world-writable

The MITRE CVE dictionary describes this issue as:

sshd in OpenSSH 6.8 and 6.9 uses world-writable permissions for TTY devices, which allows local users to cause a denial of service (terminal disruption) or possibly have unspecified other impact by writing to a device, as demonstrated by writing an escape sequence.

Find out more about CVE-2015-6565 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue did not affect the versions of openssh as shipped with Red Hat Enterprise Linux 5, 6, and 7.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 2.1
Base Metrics AV:L/AC:L/Au:N/C:N/I:P/A:N
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 7 openssh Not affected
Red Hat Enterprise Linux 6 openssh Not affected
Red Hat Enterprise Linux 5 openssh Not affected
Red Hat Enterprise Linux 4 openssh Not affected

External References

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.