OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673 - | |
References | () http://seb.dbzteam.org/crypto/jpake-session-key-retrieval.pdf - Exploit | |
References | () http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/jpake.c#rev1.5 - Patch | |
References | () http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/jpake.c.diff?r1=1.4%3Br2=1.5%3Bf=h - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=659297 - Patch | |
References | () https://github.com/seb-m/jpake - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12338 - |
07 Nov 2023, 02:06
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2010-12-06 22:30
Updated : 2024-11-21 01:21
NVD link : CVE-2010-4478
Mitre link : CVE-2010-4478
CVE.ORG link : CVE-2010-4478
JSON object : View
Products Affected
openbsd
- openssh
CWE
CWE-287
Improper Authentication