The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
Advisories
Source ID Title
EUVD EUVD EUVD-2012-0841 The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T18:38:14.970Z

Reserved: 2012-01-19T00:00:00

Link: CVE-2012-0814

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2012-01-27T19:55:01.063

Modified: 2025-04-11T00:51:21.963

Link: CVE-2012-0814

cve-icon Redhat

Severity : Low

Publid Date: 2012-01-26T00:00:00Z

Links: CVE-2012-0814 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses