CVE-1999-1029
CVSS7.5
发布时间 :1999-05-13 00:00:00
修订时间 :2016-10-17 22:00:26
NMCOS    

[原文]SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs.


[CNNVD]安全shell密码Brute Force漏洞 (CNNVD-199905-031)

        如果在最大数量的尝试之前连接被关闭,那么SSH server(ssha2)2.0.12之前的版本不能正确的记录登录尝试,远程攻击者利用该漏洞可以猜到没有在审计日志中显示出来的密码。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:ssh:ssh2:2.0.3SSH Communications Security SSH2 2.0.3
cpe:/a:ssh:ssh2:2.0.2SSH Communications Security SSH2 2.0.2
cpe:/a:ssh:ssh2:2.0.9SSH Communications Security SSH2 2.0.9
cpe:/a:ssh:ssh2:2.0.10SSH Communications Security SSH2 2.0.10
cpe:/a:ssh:ssh2:2.0.8SSH Communications Security SSH2 2.0.8
cpe:/a:ssh:ssh2:2.0.11SSH Communications Security SSH2 2.0.11
cpe:/a:ssh:ssh2:2.0
cpe:/a:ssh:ssh2:2.0.5SSH Communications Security SSH2 2.0.5
cpe:/a:ssh:ssh2:2.0.4SSH Communications Security SSH2 2.0.4
cpe:/a:ssh:ssh2:2.0.1SSH Communications Security SSH2 2.0.1
cpe:/a:ssh:ssh2:2.0.7SSH Communications Security SSH2 2.0.7
cpe:/a:ssh:ssh2:2.0.6SSH Communications Security SSH2 2.0.6

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1029
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-1029
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-199905-031
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=92663402004280&w=2
(UNKNOWN)  BUGTRAQ  19990513 - J.J.F. / Hackers Team warns for SSHD 2.x brute force password hacking
http://www.securityfocus.com/bid/277
(VENDOR_ADVISORY)  BID  277
http://xforce.iss.net/static/2193.php
(VENDOR_ADVISORY)  XF  ssh2-bruteforce(2193)

- 漏洞信息

安全shell密码Brute Force漏洞
高危 其他
1999-05-13 00:00:00 2005-10-20 00:00:00
远程  
        如果在最大数量的尝试之前连接被关闭,那么SSH server(ssha2)2.0.12之前的版本不能正确的记录登录尝试,远程攻击者利用该漏洞可以猜到没有在审计日志中显示出来的密码。

- 公告与补丁

        Upgrade to SSH2 2.0.12 or later. This version makes a log entry with the remote machine's IP address at connection time.

- 漏洞信息

8035
SSH Server sshd2 Failed Login Attempt Logging Failure

- 漏洞描述

Unknown or Incomplete

- 时间线

1999-05-14 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Secure Shell Password Brute Force Vulnerability
Failure to Handle Exceptional Conditions 277
Yes No
1999-05-13 12:00:00 2009-07-11 12:16:00
This vulnerability was published by Zhodiac <zhodiac@jjf.org>.

- 受影响的程序版本

SSH Communications Security SSH2 2.0.11
SSH Communications Security SSH2 2.0.10
SSH Communications Security SSH2 2.0.9
SSH Communications Security SSH2 2.0.8
SSH Communications Security SSH2 2.0.7
SSH Communications Security SSH2 2.0.6
SSH Communications Security SSH2 2.0.5
SSH Communications Security SSH2 2.0.4
SSH Communications Security SSH2 2.0.3
SSH Communications Security SSH2 2.0.2
SSH Communications Security SSH2 2.0.1
SSH Communications Security SSH2 2.0
SSH Communications Security SSH2 2.0.12

- 不受影响的程序版本

SSH Communications Security SSH2 2.0.12

- 漏洞讨论

A vulnerability in the SSH2 server up to and including version 2.0.11 allows remote attackers to brute force logins and passwords without the attempts being logged.

When a SSH client cconnect to the server, it has a number (default of three) of attempts to enter the correct password before it is disconnected. If the connection between the client and server is shutdown before using up all the attempts the server will fail to log the clients IP address nor that authentication failed. It will only log that the client disconnected but it will give no indication of why or who the client is.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

Upgrade to SSH2 2.0.12 or later. This version makes a log entry with the remote machine's IP address at connection time.

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站