CVE-2001-0361
CVSS4.0
发布时间 :2001-06-27 00:00:00
修订时间 :2016-10-17 22:10:45
NMCO    

[原文]Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1 version 1.5.


[CNNVD]SSH安装启用漏洞(CNNVD-200106-182)

        SSH 1.5版本包含(1) OpenSSH一直到2.3.0版本, (2)AppGate,和(3)ssh-1一直到1.2.31版本的安装启用在某些配置中存在漏洞。远程攻击者借助PKCS#1 1.5版本的"Bleichenbacher attack"解密和改变通信量。

- CVSS (基础分值)

CVSS分值: 4 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-310 [密码学安全问题]

- CPE (受影响的平台与产品)

cpe:/a:openbsd:openssh:2.1OpenBSD OpenSSH 2.1
cpe:/a:openbsd:openssh:2.1.1OpenBSD OpenSSH 2.1.1
cpe:/a:ssh:ssh:1.2.31SSH Communications Security SSH daemon 1.2.31
cpe:/a:openbsd:openssh:1.2.3OpenBSD OpenSSH 1.2.3

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:5729Multiple Vendor SSH 1.5 Session Key Recovery Vulnerability
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0361
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0361
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200106-182
(官方数据源) CNNVD

- 其它链接及资源

ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:24.ssh.asc
(UNKNOWN)  FREEBSD  FreeBSD-SA-01:24
http://marc.info/?l=bugtraq&m=98158450021686&w=2
(UNKNOWN)  BUGTRAQ  20010207 [CORE SDI ADVISORY] SSH1 session key recovery vulnerability
http://www.ciac.org/ciac/bulletins/l-047.shtml
(UNKNOWN)  CIAC  L-047
http://www.debian.org/security/2001/dsa-023
(UNKNOWN)  DEBIAN  DSA-023
http://www.debian.org/security/2001/dsa-027
(UNKNOWN)  DEBIAN  DSA-027
http://www.debian.org/security/2001/dsa-086
(UNKNOWN)  DEBIAN  DSA-086
http://www.novell.com/linux/security/advisories/adv004_ssh.html
(UNKNOWN)  SUSE  SuSE-SA:2001:04
http://www.securityfocus.com/bid/2344
(VENDOR_ADVISORY)  BID  2344
http://xforce.iss.net/static/6082.php
(UNKNOWN)  XF  ssh-session-key-recovery(6082)

- 漏洞信息

SSH安装启用漏洞
中危 未知
2001-06-27 00:00:00 2006-09-05 00:00:00
远程  
        SSH 1.5版本包含(1) OpenSSH一直到2.3.0版本, (2)AppGate,和(3)ssh-1一直到1.2.31版本的安装启用在某些配置中存在漏洞。远程攻击者借助PKCS#1 1.5版本的"Bleichenbacher attack"解密和改变通信量。

- 公告与补丁

        

- 漏洞信息

2116
PKCS 1 Version 1.5 Session Key Retrieval (Bleichenbacher Attack)
Cryptographic
Loss of Confidentiality, Loss of Integrity Upgrade
Vendor Verified

- 漏洞描述

Several protocols which implement the digital enveloping method, described in version 1.5 of the PKCS #1 standard, are susceptible to an adaptive ciphertext attack. This allows the recovery of session keys, thus compromising the integrity of the data transmitting during that session. The data encryption techniques described in RSA's PKCS #1 standard are used in many protocols which rely on, at least in part, the security provided by public-key cryptography systems.

- 时间线

2001-02-06 2001-02-06
2001-02-06 Unknow

- 解决方案

Upgrade to the latest version of SSH software and disable the SSH 1 protocol.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站