CVE-2009-2904

A certain Red Hat modification to the ChrootDirectory feature in OpenSSH 4.8, as used in sshd in OpenSSH 4.3 in Red Hat Enterprise Linux (RHEL) 5.4 and Fedora 11, allows local users to gain privileges via hard links to setuid programs that use configuration files within the chroot directory, related to requirements for directory ownership.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:4.8:*:*:*:*:*:*:*
OR cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:5:*:server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5:*:client:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5:*:*:*:*:*:*:*

History

No history.

Information

Published : 2009-10-01 15:30

Updated : 2023-12-10 10:51


NVD link : CVE-2009-2904

Mitre link : CVE-2009-2904

CVE.ORG link : CVE-2009-2904


JSON object : View

Products Affected

redhat

  • enterprise_linux
  • enterprise_linux_desktop
  • enterprise_linux_eus

fedoraproject

  • fedora

openbsd

  • openssh
CWE
CWE-16

Configuration