CVE-2004-1653 — Openssh vulnerability
6 documents6 sources
Severity
6.4MEDIUMNVD
EPSS
0.4%
top 40.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 31
Latest updateApr 29
Description
The default configuration for OpenSSH enables AllowTcpForwarding, which could allow remote authenticated users to perform a port bounce, when configured with an anonymous access program such as AnonCVS.
CVSS vector
AV:N/AC:L/C:P/I:P/A:NExploitability: 10.0 | Impact: 4.9
Affected Packages1 packages
🔴Vulnerability Details
3GHSAâ–¶
GHSA-r52p-h476-w962: The default configuration for OpenSSH enables AllowTcpForwarding, which could allow remote authenticated users to perform a port bounce, when configur↗2022-04-29
CVEListâ–¶
CVE-2004-1653: The default configuration for OpenSSH enables AllowTcpForwarding, which could allow remote authenticated users to perform a port bounce, when configur↗2005-02-20
📋Vendor Advisories
2Debianâ–¶
CVE-2004-1653: openssh - The default configuration for OpenSSH enables AllowTcpForwarding, which could al...↗2004
Red Hatâ–¶
CVE-2004-1653: The default configuration for OpenSSH enables AllowTcpForwarding, which could allow remote authenticated users to perform a port bounce, when configur↗