Vulnerabilities > CVE-2001-0361 - Cryptographic Issues vulnerability in multiple products
Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
NONE Summary
Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1 version 1.5.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 3 | |
Application | Ssh
| 32 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Recreation An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Nessus
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-023.NASL description - People at WireX have found several potential insecure uses of temporary files in programs provided by INN2. Some of them only lead to a vulnerability to symlink attacks if the temporary directory was set to /tmp or /var/tmp, which is the case in many installations, at least in Debian packages. An attacker could overwrite any file owned by the news system administrator, i.e. owned by news.news. - Michal Zalewski found an exploitable buffer overflow with regard to cancel messages and their verification. This bug did only show up if last seen 2020-06-01 modified 2020-06-02 plugin id 14860 published 2004-09-29 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/14860 title Debian DSA-023-1 : inn2 - local tempfile vulnerabilities code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Debian Security Advisory DSA-023. The text # itself is copyright (C) Software in the Public Interest, Inc. # include("compat.inc"); if (description) { script_id(14860); script_version("1.16"); script_cvs_date("Date: 2019/08/02 13:32:16"); script_cve_id("CVE-2001-0361"); script_xref(name:"DSA", value:"023"); script_name(english:"Debian DSA-023-1 : inn2 - local tempfile vulnerabilities"); script_summary(english:"Checks dpkg output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Debian host is missing a security-related update." ); script_set_attribute( attribute:"description", value: "- People at WireX have found several potential insecure uses of temporary files in programs provided by INN2. Some of them only lead to a vulnerability to symlink attacks if the temporary directory was set to /tmp or /var/tmp, which is the case in many installations, at least in Debian packages. An attacker could overwrite any file owned by the news system administrator, i.e. owned by news.news. - Michal Zalewski found an exploitable buffer overflow with regard to cancel messages and their verification. This bug did only show up if 'verifycancels' was enabled in inn.conf which is not the default and has been disrecommended by upstream. - Andi Kleen found a bug in INN2 that makes innd crash for two byte headers. There is a chance this can only be exploited with uucp." ); script_set_attribute( attribute:"see_also", value:"http://www.debian.org/security/2001/dsa-023" ); script_set_attribute( attribute:"solution", value:"Upgrade the inn2 packages immediately." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N"); script_cwe_id(310); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:inn2"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:2.2"); script_set_attribute(attribute:"patch_publication_date", value:"2001/01/26"); script_set_attribute(attribute:"plugin_publication_date", value:"2004/09/29"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc."); script_family(english:"Debian Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("debian_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian"); if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (deb_check(release:"2.2", prefix:"inn2", reference:"2.2.2.2000.01.31-4.1")) flag++; if (deb_check(release:"2.2", prefix:"inn2-dev", reference:"2.2.2.2000.01.31-4.1")) flag++; if (deb_check(release:"2.2", prefix:"inn2-inews", reference:"2.2.2.2000.01.31-4.1")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family General NASL id SSH1_PROTO_ENABLED.NASL description The remote SSH daemon supports connections made using the version 1.33 and/or 1.5 of the SSH protocol. These protocols are not completely cryptographically safe so they should not be used. last seen 2020-04-30 modified 2002-03-06 plugin id 10882 published 2002-03-06 reporter This script is Copyright (C) 2002-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/10882 title SSH Protocol Version 1 Session Key Retrieval NASL family Misc. NASL id OPENSSH_252.NASL description According to its banner, the remote host appears to be running a version of OpenSSH earlier than 2.5.2 / 2.5.2p2. It, therefore, reportedly contains weaknesses in its implementation of the SSH protocol, both versions 1 and 2. These weaknesses could allow an attacker to sniff password lengths, and ranges of length (this could make brute-force password guessing easier), determine whether RSA or DSA authentication is being used, the number of authorized_keys in RSA authentication and/or the length of shell commands. last seen 2020-06-01 modified 2020-06-02 plugin id 44068 published 2011-10-04 reporter This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/44068 title OpenSSH < 2.5.2 / 2.5.2p2 Multiple Information Disclosure Vulnerabilities NASL family CISCO NASL id CISCO_SSH_MULTIPLE_VULNS.NASL description According to its version number, the remote host is a Cisco router or switch running a vulnerable SSH daemon. By exploiting weaknesses in the SSH protocol, it is possible to insert arbitrary commands into an established SSH session, collect information that may help in brute-force key recovery, or brute-force a session key. last seen 2020-06-01 modified 2020-06-02 plugin id 10972 published 2002-06-05 reporter This script is (C) 2002-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/10972 title Cisco Devices Multiple SSH Information Disclosure Vulnerabilities NASL family Misc. NASL id SUNSSH_PLAINTEXT_RECOVERY.NASL description The version of SunSSH running on the remote host has an information disclosure vulnerability. A design flaw in the SSH specification could allow a man-in-the-middle attacker to recover up to 32 bits of plaintext from an SSH-protected connection in the standard configuration. An attacker could exploit this to gain access to sensitive information. Note that this version of SunSSH is also prone to several additional issues but Nessus did not test for them. last seen 2020-06-01 modified 2020-06-02 plugin id 55992 published 2011-08-29 reporter This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/55992 title SunSSH < 1.1.1 / 1.3 CBC Plaintext Disclosure NASL family Debian Local Security Checks NASL id DEBIAN_DSA-086.NASL description We have received reports that the last seen 2020-06-01 modified 2020-06-02 plugin id 14923 published 2004-09-29 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/14923 title Debian DSA-086-1 : ssh-nonfree - remote root exploit NASL family Debian Local Security Checks NASL id DEBIAN_DSA-027.NASL description - Versions of OpenSSH prior to 2.3.0 are vulnerable to a remote arbitrary memory overwrite attack which may lead to a root exploit. - CORE-SDI has described a problem with regards to RSA key exchange and a Bleichenbacher attack to gather the session key from an ssh session. Both of these issues have been corrected in our ssh package 1.2.3-9.2. We recommend you upgrade your openssh package immediately. last seen 2020-06-01 modified 2020-06-02 plugin id 14864 published 2004-09-29 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/14864 title Debian DSA-027-1 : OpenSSH - remote exploit
References
- ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:24.ssh.asc
- http://marc.info/?l=bugtraq&m=98158450021686&w=2
- http://www.ciac.org/ciac/bulletins/l-047.shtml
- http://www.debian.org/security/2001/dsa-023
- http://www.debian.org/security/2001/dsa-027
- http://www.debian.org/security/2001/dsa-086
- http://www.novell.com/linux/security/advisories/adv004_ssh.html
- http://www.osvdb.org/2116
- http://www.securityfocus.com/bid/2344
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6082