CVE-2008-5161
CVSS2.6
发布时间 :2008-11-19 12:30:00
修订时间 :2017-09-28 21:32:29
NMCOPS    

[原文]Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors.


[CNNVD]OpenSSH CBC模式信息泄露漏洞(CNNVD-200811-321)

        OpenSSH是一种开放源码的SSH协议的实现,初始版本用于OpenBSD平台,现在已经被移植到多种Unix/Linux类操作系统下。
        如果配置为CBC模式的话,OpenSSH没有正确地处理分组密码算法加密的SSH会话中所出现的错误,导致可能泄露密文中任意块最多32位纯文本。在以标准配置使用OpenSSH时,攻击者恢复32位纯文本的成功概率为2^{-18},此外另一种攻击变种恢复14位纯文本的成功概率为2^{-14}。

- CVSS (基础分值)

CVSS分值: 2.6 [轻微(LOW)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-200 [信息暴露]

- CPE (受影响的平台与产品)

cpe:/a:ssh:tectia_server:6.0.4::linux_ibm_zosSSH Communications Security Tectia Server 6.0.4 for Linux on IBM System Z
cpe:/a:ssh:tectia_client:5.0.2fSSH Communications Security SSH Tectia Client 5.0.2f
cpe:/a:ssh:tectia_server:5.5.0::ibm_zos
cpe:/a:ssh:tectia_server:5.0.1SSH Communications Security Tectia Server 5.0.1
cpe:/a:ssh:tectia_server:5.5.1::ibm_zos
cpe:/a:ssh:tectia_server:5.0.3SSH Communications Security Tectia Server 5.0.3
cpe:/a:ssh:tectia_server:5.0.0SSH Communications Security Tectia Server 5.0.0
cpe:/a:ssh:tectia_server:5.1.1::ibm_zos
cpe:/a:ssh:tectia_connector:4.0.7SSH Communications Security Tectia Connector 4.0.7
cpe:/a:ssh:tectia_server:5.0.2SSH Communications Security Tectia Server 5.0.2
cpe:/a:ssh:tectia_connector:4.4.0SSH Communications Security Tectia Connector 4.4.0
cpe:/a:ssh:tectia_connector:4.4.2SSH Communications Security Tectia Connector 4.4.2
cpe:/a:ssh:tectia_server:4.0.4SSH Communications Security Tectia Server 4.0.4
cpe:/a:ssh:tectia_server:4.4.0SSH Communications Security Tectia Server 4.4.0
cpe:/a:ssh:tectia_server:4.0.7SSH Communications Security Tectia Server 4.0.7
cpe:/a:ssh:tectia_client:5.3.8SSH Communications Security SSH Tectia Client 5.3.8
cpe:/a:ssh:tectia_server:4.4.1SSH Communications Security Tectia Server 4.4.1
cpe:/a:ssh:tectia_server:4.0.5SSH Communications Security Tectia Server 4.0.5
cpe:/a:ssh:tectia_client:5.3.6SSH Communications Security SSH Tectia Client 5.3.6
cpe:/a:ssh:tectia_client:5.3.7SSH Communications Security SSH Tectia Client 5.3.7
cpe:/a:ssh:tectia_server:4.0.3SSH Communications Security Tectia Server 4.0.3
cpe:/a:ssh:tectia_client:5.3.5SSH Communications Security SSH Tectia Client 5.3.5
cpe:/a:ssh:tectia_client:5.1.2SSH Communications Security SSH Tectia Client 5.1.2
cpe:/a:ssh:tectia_client:5.1.3SSH Communications Security SSH Tectia Client 5.1.3
cpe:/a:ssh:tectia_client:5.1.0SSH Communications Security SSH Tectia Client 5.1.0
cpe:/a:ssh:tectia_client:5.1.1SSH Communications Security SSH Tectia Client 5.1.1
cpe:/a:ssh:tectia_server:4.4.2SSH Communications Security Tectia Server 4.4.2
cpe:/a:ssh:tectia_client:4.2.1SSH Communications Security Tectia Client 4.2.1
cpe:/a:ssh:tectia_connector:5.0.3SSH Communications Security Tectia Connector 5.0.3
cpe:/a:ssh:tectia_client:4.4.7SSH Communications Security Tectia Client 4.4.7
cpe:/a:ssh:tectia_client:4.4.4SSH Communications Security Tectia Client 4.4.4
cpe:/a:ssh:tectia_connector:5.0.1SSH Communications Security Tectia Connector 5.0.1
cpe:/a:ssh:tectia_client:4.4.9SSH Communications Security Tectia Client 4.4.9
cpe:/a:ssh:tectia_connector:5.0.2SSH Communications Security Tectia Connector 5.0.2
cpe:/a:ssh:tectia_client:4.4.6SSH Communications Security Tectia Client 4.4.6
cpe:/a:ssh:tectia_connector:5.0.0SSH Communications Security Tectia Connector 5.0.0
cpe:/a:ssh:tectia_client:4.4.8SSH Communications Security Tectia Client 4.4.8
cpe:/a:ssh:tectia_connectsecure:6.0.4
cpe:/a:ssh:tectia_connectsecure:6.0.0
cpe:/a:ssh:tectia_connectsecure:6.0.3
cpe:/a:ssh:tectia_connectsecure:6.0.2
cpe:/a:ssh:tectia_client:4.4.10SSH Communications Security Tectia Client 4.4.10
cpe:/a:ssh:tectia_connector:4.4.10SSH Communications Security Tectia Connector 4.4.10
cpe:/a:ssh:tectia_server:5.1.3SSH Communications Security Tectia Server 5.1.3
cpe:/a:ssh:tectia_server:5.1.0SSH Communications Security Tectia Server 5.1.0
cpe:/a:ssh:tectia_connector:4.1.2SSH Communications Security Tectia Connector 4.1.2
cpe:/a:ssh:tectia_server:5.1.2SSH Communications Security Tectia Server 5.1.2
cpe:/a:ssh:tectia_connectsecure:6.0.1
cpe:/a:ssh:tectia_client:4.4.11SSH Communications Security Tectia Client 4.4.11
cpe:/a:ssh:tectia_server:5.2.0::ibm_zos
cpe:/a:ssh:tectia_server:5.1.1SSH Communications Security Tectia Server 5.1.1
cpe:/a:ssh:tectia_server:5.2.1::ibm_zos
cpe:/a:ssh:tectia_connector:4.1.3SSH Communications Security Tectia Connector 4.1.3
cpe:/a:ssh:tectia_server:5.2.2::ibm_zos
cpe:/a:ssh:tectia_connector:4.1.5SSH Communications Security Tectia Connector 4.1.5
cpe:/a:ssh:tectia_server:4.3.7SSH Communications Security Tectia Server 4.3.7
cpe:/a:ssh:tectia_server:4.3.5SSH Communications Security Tectia Server 4.3.5
cpe:/a:ssh:tectia_client:4.3.2jSSH Communications Security SSH Tectia Client 4.3.2J
cpe:/a:ssh:tectia_server:4.3.6SSH Communications Security Tectia Server 4.3.6
cpe:/a:ssh:tectia_server:4.1.3SSH Communications Security Tectia Server 4.1.3
cpe:/a:ssh:tectia_server:6.0.1SSH Communications Security SSH Tectia Server 6.0.1
cpe:/a:ssh:tectia_server:6.0.0::ibm_zos
cpe:/a:ssh:tectia_server:6.0.1::ibm_zos
cpe:/a:ssh:tectia_server:6.0.2SSH Communications Security SSH Tectia Server 6.0.2
cpe:/a:ssh:tectia_server:4.1.2SSH Communications Security Tectia Server 4.1.2
cpe:/a:ssh:tectia_server:6.0.0SSH Communications Security SSH Tectia Server 6.0.0
cpe:/a:ssh:tectia_server:6.0.3SSH Communications Security SSH Tectia Server 6.0.3
cpe:/a:ssh:tectia_client:4.3.3SSH Communications Security Tectia Client 4.3.3
cpe:/a:ssh:tectia_client:5.0.3SSH Communications Security SSH Tectia Client 5.0.3
cpe:/a:ssh:tectia_server:5.3.6SSH Communications Security SSH Tectia Server 5.3.6
cpe:/a:ssh:tectia_server:6.0.4SSH Communications Security SSH Tectia Server 6.0.4
cpe:/a:ssh:tectia_client:5.0.1SSH Communications Security SSH Tectia Client 5.0.1
cpe:/a:ssh:tectia_server:5.3.8SSH Communications Security SSH Tectia Server 5.3.8
cpe:/a:ssh:tectia_client:5.0.2SSH Communications Security SSH Tectia Client 5.0.2
cpe:/a:ssh:tectia_server:5.3.5SSH Communications Security SSH Tectia Server 5.3.5
cpe:/a:ssh:tectia_server:4.1.5SSH Communications Security Tectia Server 4.1.5
cpe:/a:ssh:tectia_client:5.0.0SSH Communications Security SSH Tectia Client 5.0.0
cpe:/a:ssh:tectia_server:5.3.7SSH Communications Security SSH Tectia Server 5.3.7
cpe:/a:ssh:tectia_server:5.3.4SSH Communications Security SSH Tectia Server 5.3.4
cpe:/a:ssh:tectia_client:4.3.2SSH Communications Security Tectia Client 4.3.2
cpe:/a:ssh:tectia_client:4.3.4SSH Communications Security Tectia Client 4.3.4
cpe:/a:ssh:tectia_client:4.3.1SSH Communications Security Tectia Client 4.3.1
cpe:/a:ssh:tectia_connector:5.1.2SSH Communications Security Tectia Connector 5.1.2
cpe:/a:ssh:tectia_connector:5.1.3SSH Communications Security Tectia Connector 5.1.3
cpe:/a:ssh:tectia_connector:5.1.0SSH Communications Security Tectia Connector 5.1.0
cpe:/a:ssh:tectia_connector:5.1.1SSH Communications Security Tectia Connector 5.1.1
cpe:/a:ssh:tectia_connector:5.3.8SSH Communications Security Tectia Connector 5.3.8
cpe:/a:ssh:tectia_client:4.3.1jSSH Communications Security Tectia Client 4.3.1 J
cpe:/a:ssh:tectia_client:4.3.9kSSH Communications Security SSH Tectia Client 4.3.9K
cpe:/a:ssh:tectia_connector:5.3.7SSH Communications Security Tectia Connector 5.3.7
cpe:/a:ssh:tectia_server:5.2.2SSH Communications Security Tectia Server 5.2.2
cpe:/a:ssh:tectia_server:5.2.4SSH Communications Security Tectia Server 5.2.4
cpe:/a:ssh:tectia_connector:4.2.0SSH Communications Security Tectia Connector 4.2.0
cpe:/a:ssh:tectia_server:5.2.0SSH Communications Security Tectia Server 5.2.0
cpe:/a:ssh:tectia_server:5.3.0::ibm_zos
cpe:/a:ssh:tectia_server:4.4.8SSH Communications Security Tectia Server 4.4.8
cpe:/a:ssh:tectia_client:4.3.8kSSH Communications Security Tectia Client 4.3.8 K
cpe:/a:ssh:tectia_server:4.4.6SSH Communications Security Tectia Server 4.4.6
cpe:/a:ssh:tectia_server:4.4.9SSH Communications Security Tectia Server 4.4.9
cpe:/a:ssh:tectia_server:4.4.4SSH Communications Security Tectia Server 4.4.4
cpe:/a:ssh:tectia_server:4.4.7SSH Communications Security Tectia Server 4.4.7
cpe:/a:ssh:tectia_server:5.2.3SSH Communications Security Tectia Server 5.2.3
cpe:/a:ssh:tectia_server:4.4.5SSH Communications Security Tectia Server 4.4.5
cpe:/a:ssh:tectia_server:4.2.2SSH Communications Security Tectia Server 4.2.2
cpe:/a:ssh:tectia_client:4.3SSH Communications Security Tectia Client 4.3
cpe:/a:ssh:tectia_client:4.2SSH Communications Security Tectia Client 4.2
cpe:/a:ssh:tectia_server:4.2.0SSH Communications Security Tectia Server 4.2.0
cpe:/a:ssh:tectia_client:4.4SSH Communications Security Tectia Client 4.4
cpe:/a:ssh:tectia_server:4.2.1SSH Communications Security Tectia Server 4.2.1
cpe:/a:ssh:tectia_client:5.0.1fSSH Communications Security SSH Tectia Client 5.0.1f
cpe:/a:ssh:tectia_client:5.3.3SSH Communications Security SSH Tectia Client 5.3.3
cpe:/a:ssh:tectia_client:4.4.2SSH Communications Security Tectia Client 4.4.2
cpe:/a:ssh:tectia_client:5.3.0SSH Communications Security SSH Tectia Client 5.3.0
cpe:/a:ssh:tectia_client:5.3.1SSH Communications Security SSH Tectia Client 5.3.1
cpe:/a:ssh:tectia_connector:4.3.5SSH Communications Security Tectia Connector 4.3.5
cpe:/a:ssh:tectia_client:4.0SSH Communications Security Tectia Client 4.0
cpe:/a:ssh:tectia_client:4.0.1SSH Communications Security Tectia Client 4.0.1
cpe:/a:ssh:tectia_client:4.0.3SSH Communications Security Tectia Client 4.0.3
cpe:/a:ssh:tectia_client:4.0.5SSH Communications Security Tectia Client 4.0.5
cpe:/a:ssh:tectia_client:4.4.1SSH Communications Security Tectia Client 4.4.1
cpe:/a:ssh:tectia_client:4.4.3SSH Communications Security Tectia Client 4.4.3
cpe:/a:ssh:tectia_client:4.0.4SSH Communications Security Tectia Client 4.0.4
cpe:/a:ssh:tectia_client:5.3.2SSH Communications Security SSH Tectia Client 5.3.2
cpe:/a:ssh:tectia_server:4.4.10SSH Communications Security Tectia Server 4.4.10
cpe:/a:ssh:tectia_connector:5.2.2SSH Communications Security Tectia Connector 5.2.2
cpe:/a:openbsd:openssh:4.7p1
cpe:/a:ssh:tectia_server:4.4.11SSH Communications Security Tectia Server 4.4.11
cpe:/a:ssh:tectia_server:4.0SSH Communications Security Tectia Server 4.0
cpe:/a:ssh:tectia_client:5.0.0fSSH Communications Security SSH Tectia Client 5.0.0f
cpe:/a:ssh:tectia_server:5.3.1SSH Communications Security SSH Tectia Server 5.3.1
cpe:/a:ssh:tectia_server:5.4.1::ibm_zos
cpe:/a:ssh:tectia_server:4.4SSH Communications Security Tectia Server 4.4
cpe:/a:ssh:tectia_server:5.4.2::ibm_zos
cpe:/a:ssh:tectia_connector:4.3.0SSH Communications Security Tectia Connector 4.3.0
cpe:/a:ssh:tectia_server:5.3.3SSH Communications Security SSH Tectia Server 5.3.3
cpe:/a:ssh:tectia_server:5.3.0SSH Communications Security SSH Tectia Server 5.3.0
cpe:/a:ssh:tectia_server:4.3SSH Communications Security Tectia Server 4.3
cpe:/a:ssh:tectia_connector:4.3.4SSH Communications Security Tectia Connector 4.3.4
cpe:/a:ssh:tectia_server:5.4.0::ibm_zos
cpe:/a:ssh:tectia_server:5.3.2SSH Communications Security SSH Tectia Server 5.3.2
cpe:/a:ssh:tectia_server:4.3.1SSH Communications Security Tectia Server 4.3.1
cpe:/a:ssh:tectia_server:4.3.4SSH Communications Security Tectia Server 4.3.4
cpe:/a:ssh:tectia_server:4.3.2SSH Communications Security Tectia Server 4.3.2
cpe:/a:ssh:tectia_server:4.3.0SSH Communications Security Tectia Server 4.3.0
cpe:/a:ssh:tectia_client:6.0.4SSH Communications Security SSH Tectia Client 6.0.4
cpe:/a:ssh:tectia_client:5.2.4SSH Communications Security SSH Tectia Client 5.2.4
cpe:/a:ssh:tectia_client:5.2.1SSH Communications Security SSH Tectia Client 5.2.1
cpe:/a:ssh:tectia_connector:4.4.7SSH Communications Security Tectia Connector 4.4.7
cpe:/a:ssh:tectia_client:5.0.3fSSH Communications Security SSH Tectia Client 5.0.3f
cpe:/a:ssh:tectia_client:5.2.2SSH Communications Security SSH Tectia Client 5.2.2
cpe:/a:ssh:tectia_connector:4.4.4SSH Communications Security Tectia Connector 4.4.4
cpe:/a:ssh:tectia_connector:4.4.9SSH Communications Security Tectia Connector 4.4.9
cpe:/a:ssh:tectia_client:5.2.0SSH Communications Security SSH Tectia Client 5.2.0
cpe:/a:ssh:tectia_connector:4.4.6SSH Communications Security Tectia Connector 4.4.6
cpe:/a:ssh:tectia_server:4.3.3SSH Communications Security Tectia Server 4.3.3
cpe:/a:ssh:tectia_client:5.2.3SSH Communications Security SSH Tectia Client 5.2.3
cpe:/a:ssh:tectia_connector:5.3.2SSH Communications Security Tectia Connector 5.3.2
cpe:/a:ssh:tectia_client:4.3.6SSH Communications Security Tectia Client 4.3.6
cpe:/a:ssh:tectia_client:6.0.3SSH Communications Security SSH Tectia Client 6.0.4
cpe:/a:ssh:tectia_connector:5.3.3SSH Communications Security Tectia Connector 5.3.3
cpe:/a:ssh:tectia_client:6.0.0SSH Communications Security SSH Tectia Client 6.0.0
cpe:/a:ssh:tectia_connector:5.3.0SSH Communications Security Tectia Connector 5.3.0
cpe:/a:ssh:tectia_connector:5.3.1SSH Communications Security Tectia Connector 5.3.1
cpe:/a:ssh:tectia_client:4.3.5SSH Communications Security Tectia Client 4.3.5
cpe:/a:ssh:tectia_client:6.0.2SSH Communications Security SSH Tectia Client 6.0.2
cpe:/a:ssh:tectia_client:4.3.7SSH Communications Security Tectia Client 4.3.7
cpe:/a:ssh:tectia_client:6.0.1SSH Communications Security SSH Tectia Client 6.0.1

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:11279Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through ...
oval:org.mitre.oval:def:22951ELSA-2009:1287: openssh security, bug fix, and enhancement update (Low)
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5161
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-5161
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200811-321
(官方数据源) CNNVD

- 其它链接及资源

http://isc.sans.org/diary.html?storyid=5366
(UNKNOWN)  MISC  http://isc.sans.org/diary.html?storyid=5366
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
(UNKNOWN)  CONFIRM  http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
(UNKNOWN)  APPLE  APPLE-SA-2009-11-09-1
http://marc.info/?l=bugtraq&m=125017764422557&w=2
(UNKNOWN)  HP  SSRT090062
http://openssh.org/txt/cbc.adv
(UNKNOWN)  CONFIRM  http://openssh.org/txt/cbc.adv
http://rhn.redhat.com/errata/RHSA-2009-1287.html
(UNKNOWN)  REDHAT  RHSA-2009:1287
http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1
(UNKNOWN)  SUNALERT  247186
http://support.apple.com/kb/HT3937
(UNKNOWN)  CONFIRM  http://support.apple.com/kb/HT3937
http://support.attachmate.com/techdocs/2398.html
(UNKNOWN)  CONFIRM  http://support.attachmate.com/techdocs/2398.html
http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm
(UNKNOWN)  MISC  http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm
http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt
(UNKNOWN)  MISC  http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt
http://www.kb.cert.org/vuls/id/958563
(UNKNOWN)  CERT-VN  VU#958563
http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html
(UNKNOWN)  CONFIRM  http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html
http://www.securityfocus.com/archive/1/archive/1/498558/100/0/threaded
(UNKNOWN)  BUGTRAQ  20081121 OpenSSH security advisory: cbc.adv
http://www.securityfocus.com/archive/1/archive/1/498579/100/0/threaded
(UNKNOWN)  BUGTRAQ  20081123 Revised: OpenSSH security advisory: cbc.adv
http://www.securityfocus.com/bid/32319
(UNKNOWN)  BID  32319
http://www.securitytracker.com/id?1021235
(UNKNOWN)  SECTRACK  1021235
http://www.securitytracker.com/id?1021236
(UNKNOWN)  SECTRACK  1021236
http://www.securitytracker.com/id?1021382
(UNKNOWN)  SECTRACK  1021382
http://www.ssh.com/company/news/article/953/
(VENDOR_ADVISORY)  CONFIRM  http://www.ssh.com/company/news/article/953/
http://www.vupen.com/english/advisories/2008/3172
(UNKNOWN)  VUPEN  ADV-2008-3172
http://www.vupen.com/english/advisories/2008/3173
(UNKNOWN)  VUPEN  ADV-2008-3173
http://www.vupen.com/english/advisories/2008/3409
(UNKNOWN)  VUPEN  ADV-2008-3409
http://www.vupen.com/english/advisories/2009/1135
(UNKNOWN)  VUPEN  ADV-2009-1135
http://www.vupen.com/english/advisories/2009/3184
(UNKNOWN)  VUPEN  ADV-2009-3184
https://exchange.xforce.ibmcloud.com/vulnerabilities/46620
(UNKNOWN)  XF  openssh-sshtectia-cbc-info-disclosure(46620)
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
(UNKNOWN)  CONFIRM  https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
https://kc.mcafee.com/corporate/index?page=content&id=SB10106
(UNKNOWN)  CONFIRM  https://kc.mcafee.com/corporate/index?page=content&id=SB10106
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
(UNKNOWN)  CONFIRM  https://kc.mcafee.com/corporate/index?page=content&id=SB10163

- 漏洞信息

OpenSSH CBC模式信息泄露漏洞
低危 信息泄露
2008-11-19 00:00:00 2009-04-30 00:00:00
远程  
        OpenSSH是一种开放源码的SSH协议的实现,初始版本用于OpenBSD平台,现在已经被移植到多种Unix/Linux类操作系统下。
        如果配置为CBC模式的话,OpenSSH没有正确地处理分组密码算法加密的SSH会话中所出现的错误,导致可能泄露密文中任意块最多32位纯文本。在以标准配置使用OpenSSH时,攻击者恢复32位纯文本的成功概率为2^{-18},此外另一种攻击变种恢复14位纯文本的成功概率为2^{-14}。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        OpenSSH
        -------
        https://downloads.ssh.com/
        临时解决方法:
        * 在SSH会话中仅使用CTR模式加密算法,如AES-CTR。
        

- 漏洞信息 (F80339)

HP Security Bulletin HPSBMA02447 SSRT090062 (PacketStormID:F80339)
2009-08-15 00:00:00
Hewlett Packard  hp.com
advisory,remote,denial of service,arbitrary,vulnerability,csrf
linux
CVE-2009-2677,CVE-2009-0590,CVE-2009-1272,CVE-2008-5161,CVE-2008-4309,CVE-2008-1720
[点击下载]

HP Security Bulletin - Potential security vulnerabilities have been identified with Insight Control Suite For Linux (ICE-LX). The vulnerabilities could be remotely exploited to allow Cross Site Request Forgery (CSRF) , Remote Execution of Arbitrary Code, Denial of Service (DoS) and other vulnerabilities.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c01820968
Version: 1

HPSBMA02447 SSRT090062 rev.1 - Insight Control Suite For Linux (ICE-LX) Cross Site Request Forgery (CSRF) , Remote Execution of Arbitrary Code, Denial of Service (DoS), and Other Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2009-08-12
Last Updated: 2009-08-12

Potential Security Impact: Cross Site Request Forgery (CSRF) , Remote Execution of Arbitrary Code, Denial of Service (DoS), and Other Vulnerabilities.

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with Insight Control Suite For Linux (ICE-LX). The vulnerabilities could be remotely exploited to allow Cross Site Request Forgery (CSRF) , Remote Execution of Arbitrary Code, Denial of Service (DoS) and other vulnerabilities.

References: CVE-2009-2677, CVE-2009-0590, CVE-2009-1272, CVE-2008-5161, CVE-2008-4309, CVE-2008-1720

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
Insight Control Suite For Linux (ICE-LX) v2.10 or earlier

BACKGROUND

CVSS 2.0 Base Metrics
===========================================================
  Reference              Base Vector             Base Score
CVE-2009-2677    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.4
CVE-2009-0590    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2009-1272    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2008-5161    (AV:N/AC:H/Au:N/C:P/I:N/A:N)       2.6
CVE-2008-4309    (AV:N/AC:L/Au:N/C:N/I:N/A:P)       5.0
CVE-2008-1720    (AV:N/AC:L/Au:N/C:P/I:P/A:P)       7.5
===========================================================
             Information on CVSS is documented
            in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has made the following updated product kit available to resolve the vulnerabilities. The HP ICE-LX v2.11 kit is available as described below.

The update file is HP_ICE_LX_V2.11_511708_004.iso which can be downloaded from here: https://h20392.www2.hp.com/portal/swdepot/try.do?productNumber=HPICELX

The kit can also be obtained by going to http://www.hp.com/go/ice-lx

Open Source packages updated in this version (v2.11) of ICE-LX

net-snmp-5.4.2.1

php 5.2.9

rsync 3.0.5

openssh 5.2 p1

openssl-0.9.8k

PRODUCT SPECIFIC INFORMATION
None

HISTORY
Version:1 (rev.1) 12 August 2009 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For further information, contact normal HP Services support channel.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information.
To get the security-alert PGP key, please send an e-mail message as follows:
  To: security-alert@hp.com
  Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email:
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC
On the web page: ITRC security bulletins and patch sign-up
Under Step1: your ITRC security bulletins and patches
    -check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems
    -verify your operating system selections are checked and save.

To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php
Log in on the web page: Subscriber's choice for Business: sign-in.
On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections.

To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do

* The Software Product Category that this Security Bulletin
relates to is represented by the 5th and 6th characters
of the Bulletin number in the title:

GN = HP General SW
MA = HP Management Agents
MI = Misc. 3rd Party SW
MP = HP MPE/iX
NS = HP NonStop Servers
OV = HP OpenVMS
PI = HP Printing & Imaging
ST = HP Storage SW
TL = HP Trusted Linux
TU = HP Tru64 UNIX
UX = HP-UX
VV = HP VirtualVault

System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.

"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."

Copyright 2009 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (HP-UX)

iEYEARECAAYFAkqDHSwACgkQ4B86/C0qfVmS0QCg0h5MSGfJD8lU0FMxByIbcrjY
KQIAn1cPRhsjlq9Ilp0pQvrO7uPbyMVH
=zsBZ
-----END PGP SIGNATURE-----
    

- 漏洞信息 (F126580)

Gentoo Linux Security Advisory 201405-06 (PacketStormID:F126580)
2014-05-12 00:00:00
Gentoo  security.gentoo.org
advisory,remote,arbitrary,vulnerability
linux,gentoo
CVE-2008-5161,CVE-2010-4478,CVE-2010-4755,CVE-2010-5107,CVE-2011-5000,CVE-2012-0814,CVE-2014-2532
[点击下载]

Gentoo Linux Security Advisory 201405-6 - Multiple vulnerabilities have been found in OpenSSH, the worst of which may allow remote attackers to execute arbitrary code. Versions less than 6.6_p1-r1 are affected.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 201405-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: High
    Title: OpenSSH: Multiple vulnerabilities
     Date: May 11, 2014
     Bugs: #231292, #247466, #386307, #410869, #419357, #456006, #505066
       ID: 201405-06

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been found in OpenSSH, the worst of which
may allow remote attackers to execute arbitrary code.

Background
==========

OpenSSH is a complete SSH protocol implementation that includes an SFTP
client and server support.

Affected packages
=================

    -------------------------------------------------------------------
     Package              /     Vulnerable     /            Unaffected
    -------------------------------------------------------------------
  1  net-misc/openssh           < 6.6_p1-r1              >= 6.6_p1-r1 

Description
===========

Multiple vulnerabilities have been discovered in OpenSSH. Please review
the CVE identifiers referenced below for details.

Impact
======

A remote attacker could execute arbitrary code, cause a Denial of
Service condition, obtain sensitive information, or bypass environment
restrictions.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All OpenSSH users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=net-misc/openssh-6.6_p1-r1"

NOTE: One or more of the issues described in this advisory have been
fixed in previous updates. They are included in this advisory for the
sake of completeness. It is likely that your system is already no
longer affected by them.

References
==========

[ 1 ] CVE-2008-5161
      http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-5161
[ 2 ] CVE-2010-4478
      http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4478
[ 3 ] CVE-2010-4755
      http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4755
[ 4 ] CVE-2010-5107
      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5107
[ 5 ] CVE-2011-5000
      http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-5000
[ 6 ] CVE-2012-0814
      http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0814
[ 7 ] CVE-2014-2532
      http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2532

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 http://security.gentoo.org/glsa/glsa-201405-06.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5
    

- 漏洞信息 (F137294)

HP Security Bulletin HPSBMU03607 1 (PacketStormID:F137294)
2016-06-02 00:00:00
HP  hp.com
advisory,denial of service,vulnerability,protocol,csrf
CVE-2008-5161,CVE-2014-3566,CVE-2015-0705,CVE-2015-1789,CVE-2015-1791,CVE-2015-3194,CVE-2015-5600,CVE-2016-0799,CVE-2016-0800,CVE-2016-2842
[点击下载]

HP Security Bulletin HPSBMU03607 1 - Multiple potential security vulnerabilities have been identified in HPE BladeSystem c-Class Virtual Connect (VC) firmware. These vulnerabilities include: The SSLv3 vulnerability known as "Padding Oracle on Downgraded Legacy Encryption" also known as "POODLE", which could be exploited remotely resulting in disclosure of information. The Cross-protocol Attack on TLS using SSLv2 also known as "DROWN", which could be exploited remotely resulting in disclosure of information. Additional OpenSSL and OpenSSH vulnerabilities which could be remotely exploited resulting in Denial of Service (DoS), disclosure of information, or Cross-site Request Forgery (CSRF). Revision 1 of this advisory.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05157667

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05157667
Version: 1

HPSBMU03607 rev.1 - HPE BladeSystem c-Class Virtual Connect (VC) Firmware,
Remote Denial of Service (DoS), Disclosure of Information, Cross-Site Request
Forgery (CSRF)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2016-06-01
Last Updated: 2016-06-01

Potential Security Impact: Remote Cross-Site Request Forgery (CSRF), Denial
of Service (DoS), Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
Multiple potential security vulnerabilities have been identified in HPE
BladeSystem c-Class Virtual Connect (VC) firmware. These vulnerabilities
include:

The SSLv3 vulnerability known as "Padding Oracle on Downgraded Legacy
Encryption" also known as "POODLE", which could be exploited remotely
resulting in disclosure of information.
The Cross-protocol Attack on TLS using SSLv2 also known as "DROWN", which
could be exploited remotely resulting in disclosure of information.
Additional OpenSSL and OpenSSH vulnerabilities which could be remotely
exploited resulting in Denial of Service (DoS), disclosure of information, or
Cross-site Request Forgery (CSRF).

References:

CVE-2016-0800
CVE-2016-0799
CVE-2016-2842
CVE-2015-1789
CVE-2015-1791
CVE-2015-3194
CVE-2015-0705
CVE-2015-5600
CVE-2014-3566
CVE-2008-5161
SSRT102281

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
The following firmware versions of Virtual Connect (VC) are impacted:

HPE BladeSystem c-Class Virtual Connect (VC) Firmware 4.30 through VC 4.45
HPE BladeSystem c-Class Virtual Connect (VC) Firmware 3.62 through VC 4.21

Note: Firmware versions 3.62 through 4.21 are not impacted by CVE-2016-0800,
CVE-2015-3194, CVE-2014-3566, CVE-2015-0705, CVE-2016-0799, and
CVE-2016-2842.

The following products run the impacted versions of Virtual Connect (VC)
firmware:

HPE VC Flex-10 10Gb Enet Module
HPE Virtual Connect Flex-10/10D Module for c-Class BladeSystem
HPE Virtual Connect FlexFabric 10Gb/24-port Module for c-Class BladeSystem
HPE Virtual Connect FlexFabric-20/40 F8 Module for c-Class BladeSystem

BACKGROUND

CVSS 2.0 Base Metrics
===========================================================
  Reference              Base Vector             Base Score
CVE-2016-0800    (AV:N/AC:M/Au:N/C:P/I:N/A:N)        4.3
CVE-2015-1789    (AV:N/AC:M/Au:N/C:N/I:N/A:P)        4.3
CVE-2015-1791    (AV:N/AC:M/Au:N/C:P/I:P/A:P)        6.8
CVE-2015-3194    (AV:N/AC:L/Au:N/C:N/I:N/A:P)        5.0
CVE-2014-3566    (AV:N/AC:M/Au:N/C:P/I:N/A:N)        4.3
CVE-2008-5161    (AV:N/AC:H/Au:N/C:P/I:N/A:N)        2.6
CVE-2015-0705    (AV:N/AC:M/Au:N/C:P/I:P/A:P)        6.8
CVE-2016-0799    (AV:N/AC:L/Au:N/C:C/I:C/A:C)       10.0
CVE-2016-2842    (AV:N/AC:L/Au:N/C:C/I:C/A:C)       10.0
CVE-2015-5600    (AV:N/AC:L/Au:N/C:P/I:N/A:C)        8.5
===========================================================
             Information on CVSS is documented
            in HP Customer Notice: HPSN-2008-002

RESOLUTION

HPE has provided an updated version of the BladeSystem c-Class Virtual
Connect (VC) firmware to address these vulnerabilities.

HPE BladeSystem c-Class Virtual Connect (VC) Firmware v4.50

The update can be downloaded from: http://h20564.www2.hpe.com/hpsc/swd/public
/detail?swItemId=MTX_1f352fb404f5410d9b2ca1b56d

HISTORY
Version:1 (rev.1) - 1 June 2016 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.

Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-alert@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBAgAGBQJXTzCcAAoJEGIGBBYqRO9/2WkH/3hK9T1TfCdTez88iHsjM8cd
l29ZGztEOUcNKPwu2FhOmAy/WDhAZMX5LK7IK0j6ClCNAW7HFBwxxdGfeF1CEL13
ChofD1q2bD585qVql2AlbaNisI90iurnAT1sgrcTs+roz2+sQ8kJutET+iDPoZmH
GOt1KM63PSkSzhjj01pSjol00gaMgXxbbbEAgma4XawjVtZxuRXf9bRaLTQl76Mo
Bo7IsioI+Hms/oCiy9TtFp21+Hyg2DrEhjrfe+6g84FEg0+sCr9JRxyZv7TDFzjV
oOzuMKpAu9Q68ZkoLWNVLv0eyiaqSvivqrgm0uU6+F5emSWgOl5G0xPhtexDrCg=
=cZnZ
-----END PGP SIGNATURE-----
    

- 漏洞信息

50035
SSH Tectia Multiple Products CBC Mode Chosen Ciphertext 32-bit Chunk Plaintext Context Disclosure
Cryptographic, Information Disclosure
Loss of Confidentiality Patch / RCS, Upgrade
Vendor Verified

- 漏洞描述

- 时间线

2008-11-17 Unknow
Unknow Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

OpenSSH CBC Mode Information Disclosure Vulnerability
Design Error 32319
Yes No
2008-11-14 12:00:00 2010-06-16 05:59:00
Martin Albrecht, Kenny Paterson, and Gaven Watson

- 受影响的程序版本

Yamaha SRT100 0
Yamaha RTX3000 0
Yamaha RTX1500
Yamaha RTX1100
Yamaha RT58i 0
Yamaha RT107e 0
VanDyke SecureCRT 6.1.2
VanDyke SecureCRT 5.2.2
VanDyke SecureCRT 5.0.5
VanDyke SecureCRT 5.0.4
VanDyke SecureCRT 4.1.9
VanDyke SecureCRT 4.1.8
VanDyke SecureCRT 4.1.7
VanDyke SecureCRT 4.1.6
VanDyke SecureCRT 4.1.5
VanDyke SecureCRT 4.1.4
VanDyke SecureCRT 4.1.3
VanDyke SecureCRT 4.1.2
VanDyke SecureCRT 4.1.1
VanDyke SecureCRT 4.1
VanDyke SecureCRT 4.0.5
VanDyke SecureCRT 4.0.4
VanDyke SecureCRT 4.0.3
VanDyke SecureCRT 4.0.2
VanDyke SecureCRT 4.0.1
VanDyke SecureCRT 4.0 beta 3
VanDyke SecureCRT 4.0 beta 2
VanDyke SecureCRT 4.0 beta 1
VanDyke SecureCRT 3.4.8
VanDyke SecureCRT 3.4.7
VanDyke SecureCRT 3.4.6
VanDyke SecureCRT 3.4.5
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
- Microsoft Windows XP Professional
VanDyke SecureCRT 3.4.4
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
- Microsoft Windows XP Professional
VanDyke SecureCRT 3.4.3
VanDyke SecureCRT 3.4.2
VanDyke SecureCRT 3.4.1
VanDyke SecureCRT 3.4
VanDyke SecureCRT 3.3.4
VanDyke SecureCRT 3.3.3
VanDyke SecureCRT 3.3.2
VanDyke SecureCRT 3.3.1
VanDyke SecureCRT 3.3
VanDyke SecureCRT 3.2.2
VanDyke SecureCRT 3.2.1
VanDyke SecureCRT 3.2
VanDyke SecureCRT 3.1.2
VanDyke SecureCRT 3.1.1
VanDyke SecureCRT 3.1
VanDyke SecureCRT 3.0
VanDyke SecureCRT 2.4
Van Dyke Technologies VShell 3.5.1
Van Dyke Technologies VShell 1.2
Van Dyke Technologies VShell 1.0.2
Van Dyke Technologies VShell 1.0.1
Van Dyke Technologies VShell 1.0
Van Dyke Technologies VShell 3.0
Van Dyke Technologies VanDyke ClientPack 6.1.2
Van Dyke Technologies SecureFX 6.1.2
Van Dyke Technologies SecureFX 4.0.2
Van Dyke Technologies SecureFX 3.0.5
Van Dyke Technologies SecureFX 3.0.4
Van Dyke Technologies SecureFX 2.1.3
Van Dyke Technologies SecureFX 2.1.2
Van Dyke Technologies SecureFX 2.1.1
Van Dyke Technologies SecureFX 2.0.5
Van Dyke Technologies SecureFX 2.0.4
Sun Solaris 9_x86
Sun Solaris 9_sparc
Sun Solaris 10_x86
Sun Solaris 10_sparc
Sun OpenSolaris build snv_96
Sun OpenSolaris build snv_95
Sun OpenSolaris build snv_92
Sun OpenSolaris build snv_91
Sun OpenSolaris build snv_90
Sun OpenSolaris build snv_89
Sun OpenSolaris build snv_88
Sun OpenSolaris build snv_87
Sun OpenSolaris build snv_85
Sun OpenSolaris build snv_80
Sun OpenSolaris build snv_68
Sun OpenSolaris build snv_67
Sun OpenSolaris build snv_64
Sun OpenSolaris build snv_59
Sun OpenSolaris build snv_57
Sun OpenSolaris build snv_50
Sun OpenSolaris build snv_39
Sun OpenSolaris build snv_36
Sun OpenSolaris build snv_22
Sun OpenSolaris build snv_19
Sun OpenSolaris build snv_13
Sun OpenSolaris build snv_104
Sun OpenSolaris build snv_103
Sun OpenSolaris build snv_102
Sun OpenSolaris build snv_100
Sun OpenSolaris build snv_02
Sun OpenSolaris build snv_01
SSH Communications Security Tectia Server for Linux on IBM System z 6.0.4
SSH Communications Security Tectia Server for IBM z/OS 6.0.1
SSH Communications Security Tectia Server for IBM z/OS 6.0
SSH Communications Security Tectia Server for IBM z/OS 5.5.1
SSH Communications Security Tectia Server 6.0.4
SSH Communications Security Tectia Server 5.3.8
SSH Communications Security Tectia Server 5.2.4
SSH Communications Security Tectia Server 4.4.11
SSH Communications Security Tectia Server 4.4.6
SSH Communications Security Tectia Server 4.4.5
SSH Communications Security Tectia Server 4.4.3
SSH Communications Security Tectia Server 4.4.2
SSH Communications Security Tectia Server 4.4
SSH Communications Security Tectia Server 6.10
SSH Communications Security Tectia ConnectSecure 6.0.4
SSH Communications Security Tectia Connector 5.3.8
SSH Communications Security Tectia Connector 5.2.4
SSH Communications Security Tectia Connector 4.4.11
SSH Communications Security Tectia Client 6.0.4
SSH Communications Security Tectia Client 5.3.8
SSH Communications Security Tectia Client 5.2.4
SSH Communications Security Tectia Client 4.4.11
SSH Communications Security Tectia Client 4.4.6
SSH Communications Security Tectia Client 4.4.5
SSH Communications Security Tectia Client 4.4.4
SSH Communications Security Tectia Client 4.4.3
SSH Communications Security Tectia Client 4.4.2
SSH Communications Security Tectia Client 4.4.1
SSH Communications Security Tectia Client 4.4
SSH Communications Security Tectia Client 4.3.9 k
SSH Communications Security Tectia Client 4.3.8 K
SSH Communications Security Tectia Client 4.3.2 J
SSH Communications Security Tectia Client 4.3.1 J
SSH Communications Security Tectia Client 4.3.3-J
SSH Communications Security Tectia Client 4.3.10-K
rPath rPath Linux 2
rPath rPath Linux 1
rPath Appliance Platform Linux Service 2
rPath Appliance Platform Linux Service 1
Red Hat Enterprise Linux Desktop 5 client
Red Hat Enterprise Linux 5 Server
OpenSSH OpenSSH 4.2
OpenSSH OpenSSH 4.1 p1
OpenSSH OpenSSH 4.1
OpenSSH OpenSSH 4.0 p1
OpenSSH OpenSSH 4.0
OpenSSH OpenSSH 5.1
OpenSSH OpenSSH 5.0
OpenSSH OpenSSH 4.9
OpenSSH OpenSSH 4.8
OpenSSH OpenSSH 4.7p1
OpenSSH OpenSSH 4.7
OpenSSH OpenSSH 4.6p1
OpenSSH OpenSSH 4.6
OpenSSH OpenSSH 4.5
OpenSSH OpenSSH 4.4.p1
OpenSSH OpenSSH 4.4
OpenSSH OpenSSH 4.3p2
OpenSSH OpenSSH 4.3p1
OpenSSH OpenSSH 4.2p1
NetBSD NetBSD 4.0.1
NetBSD NetBSD 5.0
NetBSD NetBSD 4.0
IBM AIX 6.1
IBM AIX 5.3
IBM AIX 5.2
HP Insight Control for Linux (ICE-LX) 2.10
Avaya Voice Portal 5.0
Avaya Interactive Response 3.0
Avaya Interactive Response 2.0
Avaya CMS Server 13.0
Avaya CMS Server 14.1
Avaya CMS Server 14.0
Avaya CMS Server 13.1
Avaya Aura Session Manager 1.1
Attachmate Reflection X 2008 0
Attachmate Reflection X 14.0.5
Attachmate Reflection X 14.0
Attachmate Reflection X 13.0
Attachmate Reflection X 10
Attachmate Reflection Suite for X 14.0.5
Attachmate Reflection Suite for X 10
Attachmate Reflection Standard Suite 2008 0
Attachmate Reflection FTP Client 14.0.5
Attachmate Reflection FTP Client 12.0
Attachmate Reflection FTP Client 10
Attachmate Reflection for UNIX and OpenVMS 2008 0
Attachmate Reflection for UNIX and OpenVMS 14.0.5
Attachmate Reflection for UNIX and OpenVMS 10
Attachmate Reflection for the Web 2008 0
Attachmate Reflection for the Web 9.6
Attachmate Reflection for the Web 6.0
Attachmate Reflection for Secure IT Windows Server 7.0 SP1
Attachmate Reflection for Secure IT Windows Server 6.0
Attachmate Reflection for Secure IT Windows Client 7.0 SP1
Attachmate Reflection for Secure IT Windows Client 6.0
Attachmate Reflection for Secure IT UNIX Server 7.0 SP1
Attachmate Reflection for Secure IT UNIX Server 6.0
Attachmate Reflection for Secure IT UNIX Client 7.0 SP1
Attachmate Reflection for Secure IT UNIX Client 6.0
Attachmate Reflection for IBM 2008 0
Attachmate Reflection for IBM 2007 0
Attachmate Reflection for IBM 14.0.5
Attachmate Reflection for IBM 14
Attachmate Reflection for IBM 10
Attachmate Reflection for HP 14.0.5
Attachmate Reflection for HP 10
Attachmate Reflection 13.0.5
Attachmate Reflection 13.0.4
Attachmate Reflection 14.0 SP1
Attachmate Reflection 14.0
Attachmate Reflection 13.0
Attachmate myEXTRA! Enterprise 7.1a
Attachmate KEA! X 6.0
Attachmate INFOConnect 7.5
Attachmate F-Secure SSH Server for Windows 5.0
Attachmate F-Secure SSH Server for UNIX 5.0
Attachmate F-Secure SSH Client for UNIX 5.0
Attachmate EXTRA! X-treme 9.0
Attachmate EXTRA! X-treme 8.0
Apple Mac OS X Server 10.5.8
Apple Mac OS X Server 10.5.7
Apple Mac OS X Server 10.5.6
Apple Mac OS X Server 10.5.5
Apple Mac OS X Server 10.5.4
Apple Mac OS X Server 10.5.3
Apple Mac OS X Server 10.5.2
Apple Mac OS X Server 10.5.1
Apple Mac OS X Server 10.4.11
Apple Mac OS X Server 10.4.10
Apple Mac OS X Server 10.4.9
Apple Mac OS X Server 10.4.8
Apple Mac OS X Server 10.4.7
Apple Mac OS X Server 10.4.6
Apple Mac OS X Server 10.4.5
Apple Mac OS X Server 10.4.4
Apple Mac OS X Server 10.4.3
Apple Mac OS X Server 10.4.2
Apple Mac OS X Server 10.4.1
Apple Mac OS X Server 10.4
Apple Mac OS X Server 10.3.9
Apple Mac OS X Server 10.3.8
Apple Mac OS X Server 10.3.7
Apple Mac OS X Server 10.3.6
Apple Mac OS X Server 10.3.5
Apple Mac OS X Server 10.3.4
Apple Mac OS X Server 10.3.3
Apple Mac OS X Server 10.3.2
Apple Mac OS X Server 10.3.1
Apple Mac OS X Server 10.3
Apple Mac OS X Server 10.5
Apple Mac OS X 10.5.8
Apple Mac OS X 10.5.7
Apple Mac OS X 10.5.6
Apple Mac OS X 10.5.5
Apple Mac OS X 10.5.4
Apple Mac OS X 10.5.3
Apple Mac OS X 10.5.2
Apple Mac OS X 10.5.1
Apple Mac OS X 10.4.11
Apple Mac OS X 10.4.10
Apple Mac OS X 10.4.9
Apple Mac OS X 10.4.8
Apple Mac OS X 10.4.7
Apple Mac OS X 10.4.6
Apple Mac OS X 10.4.5
Apple Mac OS X 10.4.4
Apple Mac OS X 10.4.3
Apple Mac OS X 10.4.2
Apple Mac OS X 10.4.1
Apple Mac OS X 10.4
Apple Mac OS X 10.3.9
Apple Mac OS X 10.3.8
Apple Mac OS X 10.3.7
Apple Mac OS X 10.3.6
Apple Mac OS X 10.3.5
Apple Mac OS X 10.3.4
Apple Mac OS X 10.3.3
Apple Mac OS X 10.3.2
Apple Mac OS X 10.3.1
Apple Mac OS X 10.3
Apple Mac OS X 10.5
VanDyke SecureCRT 6.1.3
Van Dyke Technologies VShell 3.5.2
Van Dyke Technologies VanDyke ClientPack 6.1.3
Van Dyke Technologies SecureFX 6.1.3
Sun OpenSolaris build snv_105
SSH Communications Security Tectia Server for Linux on IBM System z 6.0.5
SSH Communications Security Tectia Server for IBM z/OS 6.0.2
SSH Communications Security Tectia Server for IBM z/OS 5.5.2
SSH Communications Security Tectia Server 6.0.5
SSH Communications Security Tectia Server 5.3.9
SSH Communications Security Tectia Server 5.2.5
SSH Communications Security Tectia Server 4.4.12
SSH Communications Security Tectia ConnectSecure 6.0.5
SSH Communications Security Tectia Client 6.0.5
SSH Communications Security Tectia Client 5.3.9
SSH Communications Security Tectia Client 5.2.5
SSH Communications Security Tectia Client 4.4.12
SSH Communications Security Tectia Client 4.3.4-J
OpenSSH OpenSSH 5.2p1
OpenSSH OpenSSH 5.2
HP Insight Control 6.0
Attachmate Reflection X 14.1
Attachmate Reflection 14.1
Apple Mac OS X Server 10.6.2
Apple Mac OS X 10.6.2

- 不受影响的程序版本

VanDyke SecureCRT 6.1.3
Van Dyke Technologies VShell 3.5.2
Van Dyke Technologies VanDyke ClientPack 6.1.3
Van Dyke Technologies SecureFX 6.1.3
Sun OpenSolaris build snv_105
SSH Communications Security Tectia Server for Linux on IBM System z 6.0.5
SSH Communications Security Tectia Server for IBM z/OS 6.0.2
SSH Communications Security Tectia Server for IBM z/OS 5.5.2
SSH Communications Security Tectia Server 6.0.5
SSH Communications Security Tectia Server 5.3.9
SSH Communications Security Tectia Server 5.2.5
SSH Communications Security Tectia Server 4.4.12
SSH Communications Security Tectia ConnectSecure 6.0.5
SSH Communications Security Tectia Client 6.0.5
SSH Communications Security Tectia Client 5.3.9
SSH Communications Security Tectia Client 5.2.5
SSH Communications Security Tectia Client 4.4.12
SSH Communications Security Tectia Client 4.3.4-J
OpenSSH OpenSSH 5.2p1
OpenSSH OpenSSH 5.2
HP Insight Control 6.0
Attachmate Reflection X 14.1
Attachmate Reflection 14.1
Apple Mac OS X Server 10.6.2
Apple Mac OS X 10.6.2

- 漏洞讨论

OpenSSH is prone to an information-disclosure vulnerability.

Successful exploits will allow attackers to obtain four bytes of plaintext from an encrypted session.

Versions prior to OpenSSH 5.2 are vulnerable. Various versions of SSH Tectia are also affected.

- 漏洞利用

Currently we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

Updates are available. Please see the references for more information.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站