Vulnerability Description
The default configuration for OpenSSH enables AllowTcpForwarding, which could allow remote authenticated users to perform a port bounce, when configured with an anonymous access program such as AnonCVS.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openbsd | Openssh | <= 3.9 |
References
- http://marc.info/?l=bugtraq&m=109413637313484&w=2
- http://securitytracker.com/id?1011143
- http://www.osvdb.org/9562
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17213
- https://security.netapp.com/advisory/ntap-20191107-0001/
- http://marc.info/?l=bugtraq&m=109413637313484&w=2
- http://securitytracker.com/id?1011143
- http://www.osvdb.org/9562
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17213
- https://security.netapp.com/advisory/ntap-20191107-0001/
FAQ
What is CVE-2004-1653?
CVE-2004-1653 is a vulnerability with a CVSS score of 6.4 (MEDIUM). The default configuration for OpenSSH enables AllowTcpForwarding, which could allow remote authenticated users to perform a port bounce, when configured with an anonymous access program such as AnonCV...
How severe is CVE-2004-1653?
CVE-2004-1653 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-1653?
Check the references section above for vendor advisories and patch information. Affected products include: Openbsd Openssh.