Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2015-6565Openssh vulnerability

CWE-2647 documents7 sources
Severity
7.2HIGHNVD
EPSS
0.3%
top 42.93%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedAug 24
Latest updateMay 17

Description

sshd in OpenSSH 6.8 and 6.9 uses world-writable permissions for TTY devices, which allows local users to cause a denial of service (terminal disruption) or possibly have unspecified other impact by writing to a device, as demonstrated by writing an escape sequence.

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages1 packages

NVDopenbsd/openssh6.8, 6.9+1

🔴Vulnerability Details

2
GHSA
GHSA-hpw5-44xc-rfvc: sshd in OpenSSH 62022-05-17
CVEList
CVE-2015-6565: sshd in OpenSSH 62015-08-24

💥Exploits & PoCs

1
Exploit-DB
OpenSSH 6.8 < 6.9 - 'PTY' Local Privilege Escalation2017-01-26

📋Vendor Advisories

2
Red Hat
openssh: Incorrectly set TTYs to be world-writable2015-08-11
Debian
CVE-2015-6565: openssh - sshd in OpenSSH 6.8 and 6.9 uses world-writable permissions for TTY devices, whi...2015

💬Community

1
Bugzilla
CVE-2015-6565 openssh: Incorrectly set TTYs to be world-writable2015-08-12
CVE-2015-6565 — Openbsd Openssh vulnerability | cvebase