CVE-2001-1585
CVSS6.8
发布时间 :2001-12-31 00:00:00
修订时间 :2010-06-24 16:27:46
NMCO    

[原文]SSH protocol 2 (aka SSH-2) public key authentication in the development snapshot of OpenSSH 2.3.1, available from 2001-01-18 through 2001-02-08, does not perform a challenge-response step to ensure that the client has the proper private key, which allows remote attackers to bypass authentication as other users by supplying a public key from that user's authorized_keys file.


[CNNVD]OpenSSH私钥认证检查漏洞(CNNVD-200112-193)

        从2001-01-18到2001-02-08可用的OpenSSH 2.3.1版本的开发快照中的SSH protocol 2 (也称为SSH-2)公开密钥认证不执行challenge-response步骤以确保客户端有适当的私钥,远程攻击者可以通过补充来自用户的authorized_keys文件的公共密钥来绕过认证。

- CVSS (基础分值)

CVSS分值: 6.8 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-287 [认证机制不恰当]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1585
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-1585
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200112-193
(官方数据源) CNNVD

- 其它链接及资源

http://www.openbsd.org/advisories/ssh_bypass.txt
(PATCH)  CONFIRM  http://www.openbsd.org/advisories/ssh_bypass.txt
http://online.securityfocus.com/bid/2356
(PATCH)  BID  2356
http://xforce.iss.net/xforce/xfdb/6084
(UNKNOWN)  XF  openssh-bypass-authentication(6084)
http://archives.neohapsis.com/archives/bugtraq/2001-02/0159.html
(UNKNOWN)  BUGTRAQ  20010208 Authentication By-Pass Vulnerability in OpenSSH-2.3.1 (devel snapshot)

- 漏洞信息

OpenSSH私钥认证检查漏洞
中危 授权问题
2001-12-31 00:00:00 2007-10-10 00:00:00
远程  
        从2001-01-18到2001-02-08可用的OpenSSH 2.3.1版本的开发快照中的SSH protocol 2 (也称为SSH-2)公开密钥认证不执行challenge-response步骤以确保客户端有适当的私钥,远程攻击者可以通过补充来自用户的authorized_keys文件的公共密钥来绕过认证。

- 公告与补丁

        Upgrade available:
        OpenBSD OpenSSH 2.3.1
        

- 漏洞信息

504
OpenSSH SSHv2 Public Key Authentication Bypass
Local Access Required, Remote / Network Access Cryptographic, Input Manipulation
Loss of Confidentiality, Loss of Integrity, Loss of Availability Upgrade
Exploit Public Vendor Verified

- 漏洞描述

OpenSSH contains a flaw that may allow a malicious user to log in without appropriate authentication. The issue is triggered when the server is configured to use public key authentication and SSHv2. OpenSSH checks that a public key is allowed to connect, but fails to check for the presence of the corresponding private key. It is possible that the flaw may allow anyone who has a legitimate system user's public key to connect without authentication, resulting in a loss of confidentiality, integrity, and/or availability.

- 时间线

2001-02-08 Unknow
2001-02-08 Unknow

- 解决方案

Upgrade to version 2.3.2 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by disabling public key authentication.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站