CVSS 4.9 · MEDIUM
CVE-2014-2532
sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
View on NVDSeverity
Score: 4.9(MEDIUM)
Vector:
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:NAV: NETWORK
AC: HIGH
PR: LOW
UI: NONE
S: CHANGED
C: LOW
I: LOW
A: NONE
Weakness (CWE):
CWE-264EPSS
Probability of exploitation (next 30 days): 0.0020 (0.2%)
Percentile: 41.8%
EPSS: 2026-05-06
Affects
oracle:communications_user_data_repositoryopenbsd:opensshTechnical description
sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
Published: 3/18/2014, 5:18:19 AM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://advisories.mageia.org/MGASA-2014-0143.html
- http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html
- http://marc.info/?l=bugtraq&m=141576985122836&w=2
- http://marc.info/?l=openbsd-security-announce&m=139492048027313&w=2
- http://rhn.redhat.com/errata/RHSA-2014-1552.html