Vulnerabilities > CVE-2001-0361 - Cryptographic Issues vulnerability in multiple products

047910
CVSS 4.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
NONE
network
high complexity
openbsd
ssh
CWE-310
nessus

Summary

Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1 version 1.5.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Nessus

  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-023.NASL
    description- People at WireX have found several potential insecure uses of temporary files in programs provided by INN2. Some of them only lead to a vulnerability to symlink attacks if the temporary directory was set to /tmp or /var/tmp, which is the case in many installations, at least in Debian packages. An attacker could overwrite any file owned by the news system administrator, i.e. owned by news.news. - Michal Zalewski found an exploitable buffer overflow with regard to cancel messages and their verification. This bug did only show up if
    last seen2020-06-01
    modified2020-06-02
    plugin id14860
    published2004-09-29
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/14860
    titleDebian DSA-023-1 : inn2 - local tempfile vulnerabilities
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-023. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(14860);
      script_version("1.16");
      script_cvs_date("Date: 2019/08/02 13:32:16");
    
      script_cve_id("CVE-2001-0361");
      script_xref(name:"DSA", value:"023");
    
      script_name(english:"Debian DSA-023-1 : inn2 - local tempfile vulnerabilities");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "- People at WireX have found several potential insecure
        uses of temporary files in programs provided by INN2.
        Some of them only lead to a vulnerability to symlink
        attacks if the temporary directory was set to /tmp or
        /var/tmp, which is the case in many installations, at
        least in Debian packages. An attacker could overwrite
        any file owned by the news system administrator, i.e.
        owned by news.news.
      - Michal Zalewski found an exploitable buffer overflow
        with regard to cancel messages and their verification.
        This bug did only show up if 'verifycancels' was enabled
        in inn.conf which is not the default and has been
        disrecommended by upstream.
    
      - Andi Kleen found a bug in INN2 that makes innd crash for
        two byte headers. There is a chance this can only be
        exploited with uucp."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.debian.org/security/2001/dsa-023"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Upgrade the inn2 packages immediately."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N");
      script_cwe_id(310);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:inn2");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:2.2");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2001/01/26");
      script_set_attribute(attribute:"plugin_publication_date", value:"2004/09/29");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"2.2", prefix:"inn2", reference:"2.2.2.2000.01.31-4.1")) flag++;
    if (deb_check(release:"2.2", prefix:"inn2-dev", reference:"2.2.2.2000.01.31-4.1")) flag++;
    if (deb_check(release:"2.2", prefix:"inn2-inews", reference:"2.2.2.2000.01.31-4.1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyGeneral
    NASL idSSH1_PROTO_ENABLED.NASL
    descriptionThe remote SSH daemon supports connections made using the version 1.33 and/or 1.5 of the SSH protocol. These protocols are not completely cryptographically safe so they should not be used.
    last seen2020-04-30
    modified2002-03-06
    plugin id10882
    published2002-03-06
    reporterThis script is Copyright (C) 2002-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/10882
    titleSSH Protocol Version 1 Session Key Retrieval
  • NASL familyMisc.
    NASL idOPENSSH_252.NASL
    descriptionAccording to its banner, the remote host appears to be running a version of OpenSSH earlier than 2.5.2 / 2.5.2p2. It, therefore, reportedly contains weaknesses in its implementation of the SSH protocol, both versions 1 and 2. These weaknesses could allow an attacker to sniff password lengths, and ranges of length (this could make brute-force password guessing easier), determine whether RSA or DSA authentication is being used, the number of authorized_keys in RSA authentication and/or the length of shell commands.
    last seen2020-06-01
    modified2020-06-02
    plugin id44068
    published2011-10-04
    reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/44068
    titleOpenSSH < 2.5.2 / 2.5.2p2 Multiple Information Disclosure Vulnerabilities
  • NASL familyCISCO
    NASL idCISCO_SSH_MULTIPLE_VULNS.NASL
    descriptionAccording to its version number, the remote host is a Cisco router or switch running a vulnerable SSH daemon. By exploiting weaknesses in the SSH protocol, it is possible to insert arbitrary commands into an established SSH session, collect information that may help in brute-force key recovery, or brute-force a session key.
    last seen2020-06-01
    modified2020-06-02
    plugin id10972
    published2002-06-05
    reporterThis script is (C) 2002-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/10972
    titleCisco Devices Multiple SSH Information Disclosure Vulnerabilities
  • NASL familyMisc.
    NASL idSUNSSH_PLAINTEXT_RECOVERY.NASL
    descriptionThe version of SunSSH running on the remote host has an information disclosure vulnerability. A design flaw in the SSH specification could allow a man-in-the-middle attacker to recover up to 32 bits of plaintext from an SSH-protected connection in the standard configuration. An attacker could exploit this to gain access to sensitive information. Note that this version of SunSSH is also prone to several additional issues but Nessus did not test for them.
    last seen2020-06-01
    modified2020-06-02
    plugin id55992
    published2011-08-29
    reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/55992
    titleSunSSH < 1.1.1 / 1.3 CBC Plaintext Disclosure
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-086.NASL
    descriptionWe have received reports that the
    last seen2020-06-01
    modified2020-06-02
    plugin id14923
    published2004-09-29
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/14923
    titleDebian DSA-086-1 : ssh-nonfree - remote root exploit
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-027.NASL
    description- Versions of OpenSSH prior to 2.3.0 are vulnerable to a remote arbitrary memory overwrite attack which may lead to a root exploit. - CORE-SDI has described a problem with regards to RSA key exchange and a Bleichenbacher attack to gather the session key from an ssh session. Both of these issues have been corrected in our ssh package 1.2.3-9.2. We recommend you upgrade your openssh package immediately.
    last seen2020-06-01
    modified2020-06-02
    plugin id14864
    published2004-09-29
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/14864
    titleDebian DSA-027-1 : OpenSSH - remote exploit