Executive Summary
Summary | |
---|---|
Title | OpenSSH vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-2710-1 | First vendor Publication | 2015-08-14 |
Vendor | Ubuntu | Last vendor Modification | 2015-08-14 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 8.5 | Attack Range | Network |
Cvss Impact Score | 7.8 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 15.04 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS Summary: Several security issues were fixed in OpenSSH. Software Description: - openssh: secure shell (SSH) for secure access to remote machines Details: Moritz Jodeit discovered that OpenSSH incorrectly handled usernames when using PAM authentication. If an additional vulnerability were discovered in the OpenSSH unprivileged child process, this issue could allow a remote attacker to perform user impersonation. (CVE number pending) Moritz Jodeit discovered that OpenSSH incorrectly handled context memory when using PAM authentication. If an additional vulnerability were discovered in the OpenSSH unprivileged child process, this issue could allow a remote attacker to bypass authentication or possibly execute arbitrary code. (CVE number pending) Jann Horn discovered that OpenSSH incorrectly handled time windows for X connections. A remote attacker could use this issue to bypass certain access restrictions. (CVE-2015-5352) It was discovered that OpenSSH incorrectly handled keyboard-interactive authentication. In a non-default configuration, a remote attacker could possibly use this issue to perform a brute-force password attack. (CVE-2015-5600) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 15.04: Ubuntu 14.04 LTS: Ubuntu 12.04 LTS: In general, a standard system update will make all the necessary changes. References: Package Information: |
Original Source
Url : http://www.ubuntu.com/usn/USN-2710-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-264 | Permissions, Privileges, and Access Controls |
CPE : Common Platform Enumeration
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-08-20 | IAVM : 2015-A-0199 - Multiple Vulnerabilities in Apple Mac OS X Severity : Category I - VMSKEY : V0061337 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | SSH brute force login attempt RuleID : 19559 - Revision : 13 - Type : INDICATOR-SCAN |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-03-07 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL17461.nasl - Type : ACT_GATHER_INFO |
2016-05-17 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2016-0741.nasl - Type : ACT_GATHER_INFO |
2016-03-22 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2016-0466.nasl - Type : ACT_GATHER_INFO |
2016-02-18 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL17113.nasl - Type : ACT_GATHER_INFO |
2015-12-02 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2015-2088.nasl - Type : ACT_GATHER_INFO |
2015-08-19 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2710-2.nasl - Type : ACT_GATHER_INFO |
2015-08-17 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2710-1.nasl - Type : ACT_GATHER_INFO |
2015-07-28 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_5b74a5bc348f11e5ba05c80aa9043978.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-04-27 06:31:33 |
|
2015-08-21 13:20:37 |
|
2015-08-18 13:36:03 |
|
2015-08-14 21:22:47 |
|