SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Embedded Server/Appliance)  >   F5 Enterprise Manager Vendors:   F5 Networks
(F5 Networks Issues Advisory for F5 Enterprise Manager) OpenSSH 'KbdInteractiveDevices' Lets Remote Users Bypass Security Restrictions on the Target System
SecurityTracker Alert ID:  1033328
SecurityTracker URL:  http://securitytracker.com/id/1033328
CVE Reference:   CVE-2015-5600   (Links to External Site)
Date:  Aug 19 2015
Impact:   Host/resource access via network
Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 2.1.0 - 2.3.0, 3.0.0 - 3.1.1
Description:   A vulnerability was reported in OpenSSH. A remote user can bypass authentication attempt limits on the target system. F5 Enterprise Manager is affected.

A remote user can request the keyboard-interactive authentication option ('KbdInteractiveDevices') to open a large number of keyboard-interactive devices on the target server and perform a brute-force password guessing attack against the target sshd service. The number of password attempts can effectively exceed the 'MaxAuthTries' limit and are permitted to occur until the 'LoginGraceTime' limit is reached or the number of keyboard-interactive devices are used.

Servers that have keyboard-interactive authentication enabled (e.g., FreeBSD in the default configuration) are affected.

A demonstration exploit command is provided:

ssh -l[username] -oKbdInteractiveDevices=`perl -e 'print "pam," x 10000'` [target]

The original advisory is available at:

https://kingcope.wordpress.com/2015/07/16/openssh-keyboard-interactive-authentication-brute-force-vulnerability-maxauthtries-bypass/

kingcope reported this vulnerability.

Impact:   A remote user can bypass authentication attempt limits on the target system.
Solution:   F5 Networks has issued an advisory for F5 Enterprise Manager. No solution was available at the time of this entry.

F5 Networks has assigned ID 535889 to this vulnerability.

The F5 Networks advisory is available at:

https://support.f5.com/kb/en-us/solutions/public/17000/100/sol17113.html

Vendor URL:  support.f5.com/kb/en-us/solutions/public/17000/100/sol17113.html (Links to External Site)
Cause:   Access control error, State error

Message History:   This archive entry is a follow-up to the message listed below.
Jul 20 2015 OpenSSH 'KbdInteractiveDevices' Lets Remote Users Bypass Security Restrictions on the Target System



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC