CVE-2004-1653

The default configuration for OpenSSH enables AllowTcpForwarding, which could allow remote authenticated users to perform a port bounce, when configured with an anonymous access program such as AnonCVS.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:51

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=109413637313484&w=2 - () http://marc.info/?l=bugtraq&m=109413637313484&w=2 -
References () http://securitytracker.com/id?1011143 - () http://securitytracker.com/id?1011143 -
References () http://www.osvdb.org/9562 - () http://www.osvdb.org/9562 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/17213 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/17213 -
References () https://security.netapp.com/advisory/ntap-20191107-0001/ - () https://security.netapp.com/advisory/ntap-20191107-0001/ -

Information

Published : 2004-08-31 04:00

Updated : 2024-11-20 23:51


NVD link : CVE-2004-1653

Mitre link : CVE-2004-1653

CVE.ORG link : CVE-2004-1653


JSON object : View

Products Affected

openbsd

  • openssh