Description
sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Google Security Research · textlocallinux
https://www.exploit-db.com/exploits/40962
References (13)
Core 13
Core References
Vendor Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
Third Party Advisory, VDB Entry vdb-entry
http://www.securityfocus.com/bid/94972
Mailing List, Release Notes mailing-list
http://www.openwall.com/lists/oss-security/2016/12/19/2
Third Party Advisory, VDB Entry vdb-entry
http://www.securitytracker.com/id/1037490
Various Sources vendor-advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:01.openssh.asc
Exploit, Third Party Advisory exploit
https://www.exploit-db.com/exploits/40962/
Vendor Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03818en_us
Vendor Advisory
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.647637
Various Sources
https://www.openssh.com/txt/release-7.4
Vendor Advisory
https://security.netapp.com/advisory/ntap-20171130-0002/
Exploit, Third Party Advisory
http://packetstormsecurity.com/files/140262/OpenSSH-Local-Privilege-Escalation.html
Scores
CVSS v3
7.0
EPSS
0.0009
EPSS Percentile
25.4%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-264
Status
published
Products (1)
openbsd/openssh
< 7.3
Published
Jan 05, 2017
Tracked Since
Feb 18, 2026