发布时间 :1998-11-05 00:00:00
修订时间 :2008-09-05 16:19:14

[原文]Buffer overflow in ssh 1.2.26 client with Kerberos V enabled could allow remote attackers to cause a denial of service or execute arbitrary commands via a long DNS hostname that is not properly handled during TGT ticket passing.

[CNNVD]Kerberos ssh客户端拒绝服务和命令执行漏洞(CNNVD-199811-005)

        带Kerberos V的ssh 1.2.26客户端缓冲区溢出漏洞。远程攻击者可以在TGT票证传递期间,借助一个长DNS主机名导致服务拒绝或者执行任意命令。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  19981105 security patch for ssh-1.2.26 kerberos code

- 漏洞信息

Kerberos ssh客户端拒绝服务和命令执行漏洞
高危 缓冲区溢出
1998-11-05 00:00:00 2005-05-02 00:00:00
        带Kerberos V的ssh 1.2.26客户端缓冲区溢出漏洞。远程攻击者可以在TGT票证传递期间,借助一个长DNS主机名导致服务拒绝或者执行任意命令。

- 公告与补丁


- 漏洞信息

SSH Client Kerberos 5 TGT Overflow
Remote / Network Access Cryptographic, Denial of Service, Input Manipulation
Loss of Confidentiality, Loss of Integrity, Loss of Availability

- 漏洞描述

A remote overflow exists in the commercial ssh client. When Kerberos V is enable, the ssh client fails to correctly parse a long DNS hostname containing 128 bytes or more during TGT ticket passing, resulting in a buffer overflow. With a specially crafted request, an attacker can cause a denial of service or execute arbitrary code, resulting in a loss of confidentiality, integrity, and/or availability.

- 时间线

1998-11-04 1998-11-04
Unknow Unknow

- 解决方案

Upgrade to version 1.2.27 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by applying the vendor-supplied patch.

- 相关参考

- 漏洞作者

Unknown or Incomplete