Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Openssh | Openbsd | * | 6.9 (including) |
Red Hat Enterprise Linux 6 | RedHat | openssh-0:5.3p1-117.el6 | * |
Red Hat Enterprise Linux 7 | RedHat | openssh-0:6.6.1p1-22.el7 | * |
Openssh | Ubuntu | precise | * |
Openssh | Ubuntu | trusty | * |
Openssh | Ubuntu | upstream | * |
Openssh | Ubuntu | vivid | * |