SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   OpenSSH Vendors:   OpenSSH.org
(Apple Issues Fix for MacOS) Re: Weaknesses in SSH Protocols Can Facilitate Attacks Through Passive Monitoring of Protocol Traffic
SecurityTracker Alert ID:  1002109
SecurityTracker URL:  http://securitytracker.com/id/1002109
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jul 29 2001
Impact:   Disclosure of authentication information, Disclosure of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   It was reported last week that several weaknesses exist in various implementations of SSH (Secure Shell) protocols. When exploited, these vulnerabilities let an attacker obtain sensitive information by passively monitoring encrypted SSH sessions that can later be used to facilitate attacks. This could include speeding up brute-force attacks on passwords, including the initial login password and other passwords appearing in interactive SSH sessions.

Version 1 of the SSH protocol generally exposes the exact lengths of login passwords used with password authentication. The SSH-2 protocol doesn't reveal as much information, but still presents a range of possible password lengths.

Additional weaknesses reportedly allow for detection of when a password is entered during an interactive SSH session and detection of the timing of the keying, which may expose the likelihood of possible characters in each position of a password. It is also reportedly possible to determine the lengths of shell commands.

For details, please read the source message.

Impact:   An attacker that is monitoring SSH traffic could obtain sensitive information that can later be used to facilitate attacks. This could include speeding up brute-force attacks on passwords, including the initial login password and other passwords appearing in interactive SSH sessions, such as those used with su(1) and Cisco IOS "enable" passwords.
Solution:   Apple has released a fix. It is part of Web Sharing Update 1.0.
Vendor URL:  www.openssh.org (Links to External Site)
Cause:   Authentication error, Randomization error
Underlying OS:  Apple (Legacy "classic" Mac)

Message History:   This archive entry is a follow-up to the message listed below.
Mar 27 2001 Weaknesses in SSH Protocols Can Facilitate Attacks Through Passive Monitoring of Protocol Traffic



 Source Message Contents

Subject:  OpenSSH fix


OpenSSH 2.9p2 -- Fixes SSH1 vulnerability described in
http://www.openwall.com/advisories/OW-003-ssh-traffic-analysis.txt. 
               * Released in Web Sharing Update 1.0


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC