Vulnerabilities > CVE-2014-9278 - Improper Authentication vulnerability in Openbsd Openssh

047910
CVSS 4.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
SINGLE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
low complexity
openbsd
redhat
CWE-287
nessus

Summary

The OpenSSH server, as used in Fedora and Red Hat Enterprise Linux 7 and when running in a Kerberos environment, allows remote authenticated users to log in as another user when they are listed in the .k5users file of that user, which might bypass intended authentication requirements that would force a local login.

Vulnerable Configurations

Part Description Count
Application
Openbsd
1
OS
Redhat
2

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Authentication Abuse
    An attacker obtains unauthorized access to an application, service or device either through knowledge of the inherent weaknesses of an authentication mechanism, or by exploiting a flaw in the authentication scheme's implementation. In such an attack an authentication mechanism is functioning but a carefully controlled sequence of events causes the mechanism to grant access to the attacker. This attack may exploit assumptions made by the target's authentication procedures, such as assumptions regarding trust relationships or assumptions regarding the generation of secret values. This attack differs from Authentication Bypass attacks in that Authentication Abuse allows the attacker to be certified as a valid user through illegitimate means, while Authentication Bypass allows the user to access protected material without ever being certified as an authenticated user. This attack does not rely on prior sessions established by successfully authenticating users, as relied upon for the "Exploitation of Session Variables, Resource IDs and other Trusted Credentials" attack patterns.
  • Exploiting Trust in Client (aka Make the Client Invisible)
    An attack of this type exploits a programs' vulnerabilities in client/server communication channel authentication and data integrity. It leverages the implicit trust a server places in the client, or more importantly, that which the server believes is the client. An attacker executes this type of attack by placing themselves in the communication channel between client and server such that communication directly to the server is possible where the server believes it is communicating only with a valid client. There are numerous variations of this type of attack.
  • Utilizing REST's Trust in the System Resource to Register Man in the Middle
    This attack utilizes a REST(REpresentational State Transfer)-style applications' trust in the system resources and environment to place man in the middle once SSL is terminated. Rest applications premise is that they leverage existing infrastructure to deliver web services functionality. An example of this is a Rest application that uses HTTP Get methods and receives a HTTP response with an XML document. These Rest style web services are deployed on existing infrastructure such as Apache and IIS web servers with no SOAP stack required. Unfortunately from a security standpoint, there frequently is no interoperable identity security mechanism deployed, so Rest developers often fall back to SSL to deliver security. In large data centers, SSL is typically terminated at the edge of the network - at the firewall, load balancer, or router. Once the SSL is terminated the HTTP request is in the clear (unless developers have hashed or encrypted the values, but this is rare). The attacker can utilize a sniffer such as Wireshark to snapshot the credentials, such as username and password that are passed in the clear once SSL is terminated. Once the attacker gathers these credentials, they can submit requests to the web service provider just as authorized user do. There is not typically an authentication on the client side, beyond what is passed in the request itself so once this is compromised, then this is generally sufficient to compromise the service's authentication scheme.
  • Man in the Middle Attack
    This type of attack targets the communication between two components (typically client and server). The attacker places himself in the communication channel between the two components. Whenever one component attempts to communicate with the other (data flow, authentication challenges, etc.), the data first goes to the attacker, who has the opportunity to observe or alter it, and it is then passed on to the other component as if it was never intercepted. This interposition is transparent leaving the two compromised components unaware of the potential corruption or leakage of their communications. The potential for Man-in-the-Middle attacks yields an implicit lack of trust in communication or identify between two components.

Nessus

  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2015-0425.NASL
    descriptionUpdated openssh packages that fix two security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. OpenSSH is OpenBSD
    last seen2020-06-01
    modified2020-06-02
    plugin id81894
    published2015-03-18
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/81894
    titleCentOS 7 : openssh (CESA-2015:0425)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2015:0425 and 
    # CentOS Errata and Security Advisory 2015:0425 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(81894);
      script_version("1.8");
      script_cvs_date("Date: 2020/01/02");
    
      script_cve_id("CVE-2014-2653", "CVE-2014-9278");
      script_xref(name:"RHSA", value:"2015:0425");
    
      script_name(english:"CentOS 7 : openssh (CESA-2015:0425)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote CentOS host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated openssh packages that fix two security issues, several bugs,
    and add various enhancements are now available for Red Hat Enterprise
    Linux 7.
    
    Red Hat Product Security has rated this update as having Moderate
    security impact. Common Vulnerability Scoring System (CVSS) base
    scores, which give detailed severity ratings, are available for each
    vulnerability from the CVE links in the References section.
    
    OpenSSH is OpenBSD's SSH (Secure Shell) protocol implementation. These
    packages include the core files necessary for both the OpenSSH client
    and server.
    
    It was discovered that OpenSSH clients did not correctly verify DNS
    SSHFP records. A malicious server could use this flaw to force a
    connecting client to skip the DNS SSHFP record check and require the
    user to perform manual host verification of the DNS SSHFP record.
    (CVE-2014-2653)
    
    It was found that when OpenSSH was used in a Kerberos environment,
    remote authenticated users were allowed to log in as a different user
    if they were listed in the ~/.k5users file of that user, potentially
    bypassing intended authentication restrictions. (CVE-2014-9278)
    
    The openssh packages have been upgraded to upstream version 6.6.1,
    which provides a number of bug fixes and enhancements over the
    previous version. (BZ#1059667)
    
    Bug fixes :
    
    * An existing /dev/log socket is needed when logging using the syslog
    utility, which is not possible for all chroot environments based on
    the user's home directories. As a consequence, the sftp commands were
    not logged in the chroot setup without /dev/log in the internal sftp
    subsystem. With this update, openssh has been enhanced to detect
    whether /dev/log exists. If /dev/log does not exist, processes in the
    chroot environment use their master processes for logging.
    (BZ#1083482)
    
    * The buffer size for a host name was limited to 64 bytes. As a
    consequence, when a host name was 64 bytes long or longer, the
    ssh-keygen utility failed. The buffer size has been increased to fix
    this bug, and ssh-keygen no longer fails in the described situation.
    (BZ#1097665)
    
    * Non-ASCII characters have been replaced by their octal
    representations in banner messages in order to prevent terminal
    re-programming attacks. Consequently, banners containing UTF-8 strings
    were not correctly displayed in a client. With this update, banner
    messages are processed according to RFC 3454, control characters have
    been removed, and banners containing UTF-8 strings are now displayed
    correctly. (BZ#1104662)
    
    * Red Hat Enterprise Linux uses persistent Kerberos credential caches,
    which are shared between sessions. Previously, the
    GSSAPICleanupCredentials option was set to 'yes' by default.
    Consequently, removing a Kerberos cache on logout could remove
    unrelated credentials of other sessions, which could make the system
    unusable. To fix this bug, GSSAPICleanupCredentials is set by default
    to 'no'. (BZ#1134447)
    
    * Access permissions for the /etc/ssh/moduli file were set to 0600,
    which was unnecessarily strict. With this update, the permissions for
    /etc/ssh/moduli have been changed to 0644 to make the access to the
    file easier. (BZ#1134448)
    
    * Due to the KRB5CCNAME variable being truncated, the Kerberos ticket
    cache was not found after login using a Kerberos-enabled SSH
    connection. The underlying source code has been modified to fix this
    bug, and Kerberos authentication works as expected in the described
    situation. (BZ#1161173)
    
    Enhancements :
    
    * When the sshd daemon is configured to force the internal SFTP
    session, a connection other then SFTP is used, the appropriate message
    is logged to the /var/log/secure file. (BZ#1130198)
    
    * The sshd-keygen service was run using the
    'ExecStartPre=-/usr/sbin/sshd-keygen' option in the sshd.service unit
    file. With this update, the separate sshd-keygen.service unit file has
    been added, and sshd.service has been adjusted to require
    sshd-keygen.service. (BZ#1134997)
    
    Users of openssh are advised to upgrade to these updated packages,
    which correct these issues and add these enhancements."
      );
      # https://lists.centos.org/pipermail/centos-cr-announce/2015-March/001725.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?9f2883d9"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected openssh packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-2653");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:openssh");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:openssh-askpass");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:openssh-clients");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:openssh-keycat");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:openssh-ldap");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:openssh-server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:openssh-server-sysvinit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:pam_ssh_agent_auth");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/03/27");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/03/17");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/03/18");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"CentOS Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/CentOS/release", "Host/CentOS/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/CentOS/release");
    if (isnull(release) || "CentOS" >!< release) audit(AUDIT_OS_NOT, "CentOS");
    os_ver = pregmatch(pattern: "CentOS(?: Linux)? release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "CentOS");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "CentOS 7.x", "CentOS " + os_ver);
    
    if (!get_kb_item("Host/CentOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "CentOS", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"openssh-6.6.1p1-11.el7")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"openssh-askpass-6.6.1p1-11.el7")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"openssh-clients-6.6.1p1-11.el7")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"openssh-keycat-6.6.1p1-11.el7")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"openssh-ldap-6.6.1p1-11.el7")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"openssh-server-6.6.1p1-11.el7")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"openssh-server-sysvinit-6.6.1p1-11.el7")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"pam_ssh_agent_auth-0.9.3-9.11.el7")) flag++;
    
    
    if (flag)
    {
      cr_plugin_caveat = '\n' +
        'NOTE: The security advisory associated with this vulnerability has a\n' +
        'fixed package version that may only be available in the continuous\n' +
        'release (CR) repository for CentOS, until it is present in the next\n' +
        'point release of CentOS.\n\n' +
    
        'If an equal or higher package level does not exist in the baseline\n' +
        'repository for your major version of CentOS, then updates from the CR\n' +
        'repository will need to be applied in order to address the\n' +
        'vulnerability.\n';
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : rpm_report_get() + cr_plugin_caveat
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "openssh / openssh-askpass / openssh-clients / openssh-keycat / etc");
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-0425.NASL
    descriptionUpdated openssh packages that fix two security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. OpenSSH is OpenBSD
    last seen2020-06-01
    modified2020-06-02
    plugin id81635
    published2015-03-05
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/81635
    titleRHEL 7 : openssh (RHSA-2015:0425)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2015:0425. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(81635);
      script_version("1.12");
      script_cvs_date("Date: 2019/10/24 15:35:39");
    
      script_cve_id("CVE-2014-2653", "CVE-2014-9278");
      script_xref(name:"RHSA", value:"2015:0425");
    
      script_name(english:"RHEL 7 : openssh (RHSA-2015:0425)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated openssh packages that fix two security issues, several bugs,
    and add various enhancements are now available for Red Hat Enterprise
    Linux 7.
    
    Red Hat Product Security has rated this update as having Moderate
    security impact. Common Vulnerability Scoring System (CVSS) base
    scores, which give detailed severity ratings, are available for each
    vulnerability from the CVE links in the References section.
    
    OpenSSH is OpenBSD's SSH (Secure Shell) protocol implementation. These
    packages include the core files necessary for both the OpenSSH client
    and server.
    
    It was discovered that OpenSSH clients did not correctly verify DNS
    SSHFP records. A malicious server could use this flaw to force a
    connecting client to skip the DNS SSHFP record check and require the
    user to perform manual host verification of the DNS SSHFP record.
    (CVE-2014-2653)
    
    It was found that when OpenSSH was used in a Kerberos environment,
    remote authenticated users were allowed to log in as a different user
    if they were listed in the ~/.k5users file of that user, potentially
    bypassing intended authentication restrictions. (CVE-2014-9278)
    
    The openssh packages have been upgraded to upstream version 6.6.1,
    which provides a number of bug fixes and enhancements over the
    previous version. (BZ#1059667)
    
    Bug fixes :
    
    * An existing /dev/log socket is needed when logging using the syslog
    utility, which is not possible for all chroot environments based on
    the user's home directories. As a consequence, the sftp commands were
    not logged in the chroot setup without /dev/log in the internal sftp
    subsystem. With this update, openssh has been enhanced to detect
    whether /dev/log exists. If /dev/log does not exist, processes in the
    chroot environment use their master processes for logging.
    (BZ#1083482)
    
    * The buffer size for a host name was limited to 64 bytes. As a
    consequence, when a host name was 64 bytes long or longer, the
    ssh-keygen utility failed. The buffer size has been increased to fix
    this bug, and ssh-keygen no longer fails in the described situation.
    (BZ#1097665)
    
    * Non-ASCII characters have been replaced by their octal
    representations in banner messages in order to prevent terminal
    re-programming attacks. Consequently, banners containing UTF-8 strings
    were not correctly displayed in a client. With this update, banner
    messages are processed according to RFC 3454, control characters have
    been removed, and banners containing UTF-8 strings are now displayed
    correctly. (BZ#1104662)
    
    * Red Hat Enterprise Linux uses persistent Kerberos credential caches,
    which are shared between sessions. Previously, the
    GSSAPICleanupCredentials option was set to 'yes' by default.
    Consequently, removing a Kerberos cache on logout could remove
    unrelated credentials of other sessions, which could make the system
    unusable. To fix this bug, GSSAPICleanupCredentials is set by default
    to 'no'. (BZ#1134447)
    
    * Access permissions for the /etc/ssh/moduli file were set to 0600,
    which was unnecessarily strict. With this update, the permissions for
    /etc/ssh/moduli have been changed to 0644 to make the access to the
    file easier. (BZ#1134448)
    
    * Due to the KRB5CCNAME variable being truncated, the Kerberos ticket
    cache was not found after login using a Kerberos-enabled SSH
    connection. The underlying source code has been modified to fix this
    bug, and Kerberos authentication works as expected in the described
    situation. (BZ#1161173)
    
    Enhancements :
    
    * When the sshd daemon is configured to force the internal SFTP
    session, a connection other then SFTP is used, the appropriate message
    is logged to the /var/log/secure file. (BZ#1130198)
    
    * The sshd-keygen service was run using the
    'ExecStartPre=-/usr/sbin/sshd-keygen' option in the sshd.service unit
    file. With this update, the separate sshd-keygen.service unit file has
    been added, and sshd.service has been adjusted to require
    sshd-keygen.service. (BZ#1134997)
    
    Users of openssh are advised to upgrade to these updated packages,
    which correct these issues and add these enhancements."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2015:0425"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2014-2653"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2014-9278"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:openssh");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:openssh-askpass");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:openssh-clients");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:openssh-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:openssh-keycat");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:openssh-ldap");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:openssh-server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:openssh-server-sysvinit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:pam_ssh_agent_auth");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7.3");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7.4");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7.5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7.6");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7.7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/03/27");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/03/05");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/03/05");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 7.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2015:0425";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"openssh-6.6.1p1-11.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"openssh-6.6.1p1-11.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"openssh-askpass-6.6.1p1-11.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"openssh-askpass-6.6.1p1-11.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"openssh-clients-6.6.1p1-11.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"openssh-clients-6.6.1p1-11.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", reference:"openssh-debuginfo-6.6.1p1-11.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"openssh-keycat-6.6.1p1-11.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"openssh-keycat-6.6.1p1-11.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"openssh-ldap-6.6.1p1-11.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"openssh-ldap-6.6.1p1-11.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"openssh-server-6.6.1p1-11.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"openssh-server-6.6.1p1-11.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"openssh-server-sysvinit-6.6.1p1-11.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"openssh-server-sysvinit-6.6.1p1-11.el7")) flag++;
    
      if (rpm_check(release:"RHEL7", reference:"pam_ssh_agent_auth-0.9.3-9.11.el7")) flag++;
    
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "openssh / openssh-askpass / openssh-clients / openssh-debuginfo / etc");
      }
    }
    
  • NASL familyNewStart CGSL Local Security Checks
    NASL idNEWSTART_CGSL_NS-SA-2019-0146_OPENSSH-LATEST.NASL
    descriptionThe remote NewStart CGSL host, running version MAIN 4.05, has openssh-latest packages installed that are affected by multiple vulnerabilities: - scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice. (CVE-2006-0225) - sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector. (CVE-2006-4924) - Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free. (CVE-2006-5051) - Unspecified vulnerability in the sshd Privilege Separation Monitor in OpenSSH before 4.5 causes weaker verification that authentication has been successful, which might allow attackers to bypass authentication. NOTE: as of 20061108, it is believed that this issue is only exploitable by leveraging vulnerabilities in the unprivileged process, which are not known to exist. (CVE-2006-5794) - Unspecified vulnerability in the linux_audit_record_event function in OpenSSH 4.3p2, as used on Fedora Core 6 and possibly other systems, allows remote attackers to write arbitrary characters to an audit log via a crafted username. NOTE: some of these details are obtained from third party information. (CVE-2007-3102) - The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632. (CVE-2010-4755) - The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections. (CVE-2010-5107) - It was found that OpenSSH did not properly handle certain AcceptEnv parameter values with wildcard characters. A remote attacker could use this flaw to bypass intended environment variable restrictions. (CVE-2014-2532) - It was discovered that OpenSSH clients did not correctly verify DNS SSHFP records. A malicious server could use this flaw to force a connecting client to skip the DNS SSHFP record check and require the user to perform manual host verification of the DNS SSHFP record. (CVE-2014-2653) - It was found that when OpenSSH was used in a Kerberos environment, remote authenticated users were allowed to log in as a different user if they were listed in the ~/.k5users file of that user, potentially bypassing intended authentication restrictions. (CVE-2014-9278) - It was discovered that the OpenSSH sshd daemon did not check the list of keyboard-interactive authentication methods for duplicates. A remote attacker could use this flaw to bypass the MaxAuthTries limit, making it easier to perform password guessing attacks. (CVE-2015-5600) - It was discovered that the OpenSSH sshd daemon fetched PAM environment settings before running the login program. In configurations with UseLogin=yes and the pam_env PAM module configured to read user environment settings, a local user could use this flaw to execute arbitrary code as root. (CVE-2015-8325) - An information leak flaw was found in the way the OpenSSH client roaming feature was implemented. A malicious server could potentially use this flaw to leak portions of memory (possibly including private SSH keys) of a successfully authenticated OpenSSH client. (CVE-2016-0777) - An access flaw was discovered in OpenSSH; the OpenSSH client did not correctly handle failures to generate authentication cookies for untrusted X11 forwarding. A malicious or compromised remote X application could possibly use this flaw to establish a trusted connection to the local X server, even if only untrusted X11 forwarding was requested. (CVE-2016-1908) - A covert timing channel flaw was found in the way OpenSSH handled authentication of non-existent users. A remote unauthenticated attacker could possibly use this flaw to determine valid user names by measuring the timing of server responses. (CVE-2016-6210) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id127415
    published2019-08-12
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127415
    titleNewStart CGSL MAIN 4.05 : openssh-latest Multiple Vulnerabilities (NS-SA-2019-0146)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    # The descriptive text and package checks in this plugin were
    # extracted from ZTE advisory NS-SA-2019-0146. The text
    # itself is copyright (C) ZTE, Inc.
    
    include("compat.inc");
    
    if (description)
    {
      script_id(127415);
      script_version("1.3");
      script_cvs_date("Date: 2019/09/24 11:01:33");
    
      script_cve_id(
        "CVE-2006-0225",
        "CVE-2006-4924",
        "CVE-2006-5051",
        "CVE-2006-5794",
        "CVE-2007-3102",
        "CVE-2010-4755",
        "CVE-2010-5107",
        "CVE-2014-2532",
        "CVE-2014-2653",
        "CVE-2014-9278",
        "CVE-2015-5600",
        "CVE-2015-8325",
        "CVE-2016-0777",
        "CVE-2016-1908",
        "CVE-2016-6210"
      );
    
      script_name(english:"NewStart CGSL MAIN 4.05 : openssh-latest Multiple Vulnerabilities (NS-SA-2019-0146)");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote machine is affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The remote NewStart CGSL host, running version MAIN 4.05, has openssh-latest packages installed that are affected by
    multiple vulnerabilities:
    
      - scp in OpenSSH 4.2p1 allows attackers to execute
        arbitrary commands via filenames that contain shell
        metacharacters or spaces, which are expanded twice.
        (CVE-2006-0225)
    
      - sshd in OpenSSH before 4.4, when using the version 1 SSH
        protocol, allows remote attackers to cause a denial of
        service (CPU consumption) via an SSH packet that
        contains duplicate blocks, which is not properly handled
        by the CRC compensation attack detector. (CVE-2006-4924)
    
      - Signal handler race condition in OpenSSH before 4.4
        allows remote attackers to cause a denial of service
        (crash), and possibly execute arbitrary code if GSSAPI
        authentication is enabled, via unspecified vectors that
        lead to a double-free. (CVE-2006-5051)
    
      - Unspecified vulnerability in the sshd Privilege
        Separation Monitor in OpenSSH before 4.5 causes weaker
        verification that authentication has been successful,
        which might allow attackers to bypass authentication.
        NOTE: as of 20061108, it is believed that this issue is
        only exploitable by leveraging vulnerabilities in the
        unprivileged process, which are not known to exist.
        (CVE-2006-5794)
    
      - Unspecified vulnerability in the
        linux_audit_record_event function in OpenSSH 4.3p2, as
        used on Fedora Core 6 and possibly other systems, allows
        remote attackers to write arbitrary characters to an
        audit log via a crafted username. NOTE: some of these
        details are obtained from third party information.
        (CVE-2007-3102)
    
      - The (1) remote_glob function in sftp-glob.c and the (2)
        process_put function in sftp.c in OpenSSH 5.8 and
        earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2,
        OpenBSD 4.7, and other products, allow remote
        authenticated users to cause a denial of service (CPU
        and memory consumption) via crafted glob expressions
        that do not match any pathnames, as demonstrated by glob
        expressions in SSH_FXP_STAT requests to an sftp daemon,
        a different vulnerability than CVE-2010-2632.
        (CVE-2010-4755)
    
      - The default configuration of OpenSSH through 6.1
        enforces a fixed time limit between establishing a TCP
        connection and completing a login, which makes it easier
        for remote attackers to cause a denial of service
        (connection-slot exhaustion) by periodically making many
        new TCP connections. (CVE-2010-5107)
    
      - It was found that OpenSSH did not properly handle
        certain AcceptEnv parameter values with wildcard
        characters. A remote attacker could use this flaw to
        bypass intended environment variable restrictions.
        (CVE-2014-2532)
    
      - It was discovered that OpenSSH clients did not correctly
        verify DNS SSHFP records. A malicious server could use
        this flaw to force a connecting client to skip the DNS
        SSHFP record check and require the user to perform
        manual host verification of the DNS SSHFP record.
        (CVE-2014-2653)
    
      - It was found that when OpenSSH was used in a Kerberos
        environment, remote authenticated users were allowed to
        log in as a different user if they were listed in the
        ~/.k5users file of that user, potentially bypassing
        intended authentication restrictions. (CVE-2014-9278)
    
      - It was discovered that the OpenSSH sshd daemon did not
        check the list of keyboard-interactive authentication
        methods for duplicates. A remote attacker could use this
        flaw to bypass the MaxAuthTries limit, making it easier
        to perform password guessing attacks. (CVE-2015-5600)
    
      - It was discovered that the OpenSSH sshd daemon fetched
        PAM environment settings before running the login
        program. In configurations with UseLogin=yes and the
        pam_env PAM module configured to read user environment
        settings, a local user could use this flaw to execute
        arbitrary code as root. (CVE-2015-8325)
    
      - An information leak flaw was found in the way the
        OpenSSH client roaming feature was implemented. A
        malicious server could potentially use this flaw to leak
        portions of memory (possibly including private SSH keys)
        of a successfully authenticated OpenSSH client.
        (CVE-2016-0777)
    
      - An access flaw was discovered in OpenSSH; the OpenSSH
        client did not correctly handle failures to generate
        authentication cookies for untrusted X11 forwarding. A
        malicious or compromised remote X application could
        possibly use this flaw to establish a trusted connection
        to the local X server, even if only untrusted X11
        forwarding was requested. (CVE-2016-1908)
    
      - A covert timing channel flaw was found in the way
        OpenSSH handled authentication of non-existent users. A
        remote unauthenticated attacker could possibly use this
        flaw to determine valid user names by measuring the
        timing of server responses. (CVE-2016-6210)
    
    Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
    number.");
      script_set_attribute(attribute:"see_also", value:"http://security.gd-linux.com/notice/NS-SA-2019-0146");
      script_set_attribute(attribute:"solution", value:
    "Upgrade the vulnerable CGSL openssh-latest packages. Note that updated packages may not be available yet. Please contact
    ZTE for more information.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2006-5051");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_cwe_id(362, 399);
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/01/25");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/07/17");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/08/12");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"NewStart CGSL Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/ZTE-CGSL/release", "Host/ZTE-CGSL/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    release = get_kb_item("Host/ZTE-CGSL/release");
    if (isnull(release) || release !~ "^CGSL (MAIN|CORE)") audit(AUDIT_OS_NOT, "NewStart Carrier Grade Server Linux");
    
    if (release !~ "CGSL MAIN 4.05")
      audit(AUDIT_OS_NOT, 'NewStart CGSL MAIN 4.05');
    
    if (!get_kb_item("Host/ZTE-CGSL/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "NewStart Carrier Grade Server Linux", cpu);
    
    flag = 0;
    
    pkgs = {
      "CGSL MAIN 4.05": [
        "openssh-latest-7.9p1-1.el6.cgsl7741",
        "openssh-latest-askpass-7.9p1-1.el6.cgsl7741",
        "openssh-latest-cavs-7.9p1-1.el6.cgsl7741",
        "openssh-latest-clients-7.9p1-1.el6.cgsl7741",
        "openssh-latest-debuginfo-7.9p1-1.el6.cgsl7741",
        "openssh-latest-keycat-7.9p1-1.el6.cgsl7741",
        "openssh-latest-ldap-7.9p1-1.el6.cgsl7741",
        "openssh-latest-server-7.9p1-1.el6.cgsl7741"
      ]
    };
    pkg_list = pkgs[release];
    
    foreach (pkg in pkg_list)
      if (rpm_check(release:"ZTE " + release, reference:pkg)) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "openssh-latest");
    }
    
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2015-0425.NASL
    descriptionFrom Red Hat Security Advisory 2015:0425 : Updated openssh packages that fix two security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. OpenSSH is OpenBSD
    last seen2020-06-01
    modified2020-06-02
    plugin id81725
    published2015-03-10
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/81725
    titleOracle Linux 7 : openssh (ELSA-2015-0425)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20150305_OPENSSH_ON_SL7_X.NASL
    descriptionIt was discovered that OpenSSH clients did not correctly verify DNS SSHFP records. A malicious server could use this flaw to force a connecting client to skip the DNS SSHFP record check and require the user to perform manual host verification of the DNS SSHFP record. (CVE-2014-2653) It was found that when OpenSSH was used in a Kerberos environment, remote authenticated users were allowed to log in as a different user if they were listed in the ~/.k5users file of that user, potentially bypassing intended authentication restrictions. (CVE-2014-9278) The openssh packages have been upgraded to upstream version 6.6.1, which provides a number of bug fixes and enhancements over the previous version. Bug fixes : - An existing /dev/log socket is needed when logging using the syslog utility, which is not possible for all chroot environments based on the user
    last seen2020-03-18
    modified2015-03-26
    plugin id82258
    published2015-03-26
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/82258
    titleScientific Linux Security Update : openssh on SL7.x x86_64 (20150305)

Redhat

advisories
bugzilla
id1169843
titleCVE-2014-9278 openssh: ~/.k5users unexpectedly grants remote login
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 7 is installed
      ovaloval:com.redhat.rhba:tst:20150364027
    • OR
      • AND
        • commentopenssh-server-sysvinit is earlier than 0:6.6.1p1-11.el7
          ovaloval:com.redhat.rhsa:tst:20150425001
        • commentopenssh-server-sysvinit is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20150425002
      • AND
        • commentopenssh-ldap is earlier than 0:6.6.1p1-11.el7
          ovaloval:com.redhat.rhsa:tst:20150425003
        • commentopenssh-ldap is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20120884010
      • AND
        • commentpam_ssh_agent_auth is earlier than 0:0.9.3-9.11.el7
          ovaloval:com.redhat.rhsa:tst:20150425005
        • commentpam_ssh_agent_auth is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20120884012
      • AND
        • commentopenssh-askpass is earlier than 0:6.6.1p1-11.el7
          ovaloval:com.redhat.rhsa:tst:20150425007
        • commentopenssh-askpass is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20120884008
      • AND
        • commentopenssh-server is earlier than 0:6.6.1p1-11.el7
          ovaloval:com.redhat.rhsa:tst:20150425009
        • commentopenssh-server is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20120884006
      • AND
        • commentopenssh is earlier than 0:6.6.1p1-11.el7
          ovaloval:com.redhat.rhsa:tst:20150425011
        • commentopenssh is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20120884004
      • AND
        • commentopenssh-clients is earlier than 0:6.6.1p1-11.el7
          ovaloval:com.redhat.rhsa:tst:20150425013
        • commentopenssh-clients is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20120884002
      • AND
        • commentopenssh-keycat is earlier than 0:6.6.1p1-11.el7
          ovaloval:com.redhat.rhsa:tst:20150425015
        • commentopenssh-keycat is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20150425016
rhsa
idRHSA-2015:0425
released2015-03-05
severityModerate
titleRHSA-2015:0425: openssh security, bug fix and enhancement update (Moderate)
rpms
  • openssh-0:6.6.1p1-11.el7
  • openssh-askpass-0:6.6.1p1-11.el7
  • openssh-clients-0:6.6.1p1-11.el7
  • openssh-debuginfo-0:6.6.1p1-11.el7
  • openssh-keycat-0:6.6.1p1-11.el7
  • openssh-ldap-0:6.6.1p1-11.el7
  • openssh-server-0:6.6.1p1-11.el7
  • openssh-server-sysvinit-0:6.6.1p1-11.el7
  • pam_ssh_agent_auth-0:0.9.3-9.11.el7