Upstream information

CVE-2015-8400 at MITRE

Description

The HTTPS fallback implementation in Shell In A Box (aka shellinabox) before 2.19 makes it easier for remote attackers to conduct DNS rebinding attacks via the "/plain" URL.

SUSE information

Overall state of this security issue: Ignore

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.3
Vector AV:N/AC:M/Au:N/C:N/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
SUSE Bugzilla entry: 957748 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE Leap 42.1
  • shellinabox >= 2.20-11.1
  • shellinabox-debuginfo >= 2.20-11.1
  • shellinabox-debugsource >= 2.20-11.1
Patchnames:
openSUSE-2016-1501
openSUSE Leap 42.2
  • shellinabox >= 2.20-12.1
  • shellinabox-debuginfo >= 2.20-12.1
  • shellinabox-debugsource >= 2.20-12.1
Patchnames:
openSUSE-2016-1501