Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2012-0814

EPSS 0.26% · P50
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2012-0814

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
OpenSSH 信任管理问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OpenSSH(OpenBSD Secure Shell)是加拿大OpenBSD计划组的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 5.7之前版本的sshd的auth-options.c的auth_parse_options函数中存在信任管理问题漏洞,该漏洞源于其提供包含authorized_keys命令选项的调试信息。远程认证用户可利用该漏洞通过读取这些信息获取潜在的敏感信息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2012-0814

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2012-0814

登录查看更多情报信息。

Same Patch Batch · n/a · 2012-01-27 · 20 CVEs total

CVE-2011-4330Linux Kernel本地权限提升漏洞
CVE-2012-0807PHP ‘suhosin_encrypt_single_cookie’函数缓冲区溢出漏洞
CVE-2012-0806Bip缓冲区溢出漏洞
CVE-2012-0395EMC NetWorker缓冲区溢出漏洞
CVE-2011-4354OpenSSL 加密问题漏洞
CVE-2011-4143EMC RSA enVision信息泄露漏洞
CVE-2012-0056Linux kernel 权限许可和访问控制问题漏洞
CVE-2012-0029QEMU 缓冲区错误漏洞
CVE-2011-4622Linux Kernel拒绝服务漏洞
CVE-2011-4608Red Hat JBoss Enterprise Application Platform 权限许可和访问控制问题漏洞
CVE-2011-1162Linux Kernel ‘tpm_read()’信息泄漏漏洞
CVE-2011-4325Linux kernel 安全漏洞
CVE-2011-4314Red Hat ‘JBoss Enterprise Web Platform’ 安全漏洞
CVE-2011-4132Linux Kernel 'journal_get_superblock()' 拒绝服务漏洞
CVE-2011-4110Linux kernel 权限许可和访问控制问题漏洞
CVE-2011-4077Linux Kernel ‘xfs_readlink()’ 缓冲区错误漏洞
CVE-2011-3874Android ‘libsysutils’缓冲区溢出漏洞
CVE-2011-3626Logsurfer ‘prepare_exec’函数资源管理错误漏洞
CVE-2011-2203Linux kernel 权限许可和访问控制问题漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2012-0814

No comments yet


Leave a comment