VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
CVE-2010-4478
openssh: OpenSSH 5.6 and earlier, when J-PAKE is enabled, do...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4478

Original

OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-12-06
Source Information Category:
Advisory, Alert
Last Updated:
2010-12-07




Affected Product Tags
cpe:/a:openssh:openssh
cpe:/a:openssh:openssh:1
cpe:/a:openssh:openssh:2.1.1
cpe:/a:openssh:openssh:2.2.0
cpe:/a:openssh:openssh:2.3.0
cpe:/a:openssh:openssh:2.3.1
cpe:/a:openssh:openssh:2.9.9
cpe:/a:openssh:openssh:3.0.2
cpe:/a:openssh:openssh:3.1
cpe:/a:openssh:openssh:3.1::p1
cpe:/a:openssh:openssh:3.2
cpe:/a:openssh:openssh:3.2.1
cpe:/a:openssh:openssh:3.2.2
cpe:/a:openssh:openssh:3.2.2::p1
cpe:/a:openssh:openssh:3.2.3
cpe:/a:openssh:openssh:3.2.3::p1
cpe:/a:openssh:openssh:3.3
cpe:/a:openssh:openssh:3.3::p1
cpe:/a:openssh:openssh:3.4
cpe:/a:openssh:openssh:3.4::p1
cpe:/a:openssh:openssh:3.4::p1-1
cpe:/a:openssh:openssh:3.5
cpe:/a:openssh:openssh:3.5::p1
cpe:/a:openssh:openssh:3.5:p1
cpe:/a:openssh:openssh:3.6.1
cpe:/a:openssh:openssh:3.6.1::p1
cpe:/a:openssh:openssh:3.6.1::p2
cpe:/a:openssh:openssh:3.7.1
cpe:/a:openssh:openssh:3.7.1p2
cpe:/a:openssh:openssh:4
cpe:/a:openssh:openssh:4.2
cpe:/a:openssh:openssh:4.3
cpe:/a:openssh:openssh:4.3:sp2
cpe:/a:openssh:openssh:4.3p2
cpe:/a:openssh:openssh:4.4
cpe:/a:openssh:openssh:4.5
cpe:/a:openssh:openssh:4.6
cpe:/a:openssh:openssh:4.7
cpe:/a:openssh:openssh:4.7p1
cpe:/a:openssh:openssh:4.8
cpe:/a:openssh:openssh:4.9
cpe:/a:openssh:openssh:5.0
cpe:/a:openssh:openssh:5.5
cpe:/a:openssh:openssh:5.6 and previous versions
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
Medium [?]
X Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
X None [?]

[Confidentiality Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

[Integrity Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

[Availability Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

Alternatives




References
CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=659297




CONFIRM http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/jpake.c.diff?r1=1.4;r2=1.5;f=h




CONFIRM http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/jpake.c#rev1.5




MISC https://github.com/seb-m/jpake




MISC http://seb.dbzteam.org/crypto/jpake-session-key-retrieval.pdf




Vulnerability Type Authentication Issues (CWE-287)





Copyright © 2010 JPCERT/CC All Rights Reserved.