Unrated severityNVD Advisory· Published Jun 19, 2001· Updated Apr 16, 2026
CVE-2001-1459
CVE-2001-1459
Description
OpenSSH 2.9 and earlier does not initiate a Pluggable Authentication Module (PAM) session if commands are executed with no pty, which allows local users to bypass resource limits (rlimits) set in pam.d.
Affected products
8cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*+ 7 more
- cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.kb.cert.org/vuls/id/797027nvdThird Party AdvisoryUS Government Resource
- www.securityfocus.com/bid/2917nvdVendor Advisory
- marc.infonvd
- exchange.xforce.ibmcloud.com/vulnerabilities/6757nvd
News mentions
0No linked articles in our index yet.