8.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:P/I:N/A:C
0.164 Low
EPSS
Percentile
95.9%
Package : openssh
Version : 1:5.5p1-6+squeeze6
CVE ID : CVE-2015-5352 CVE-2015-5600
Debian Bug : #790798 #793616
A recent upload of OpenSSH to Debian squeeze-lts fixes two security issues.
CVE-2015-5352
It was reported that when forwarding X11 connections with
ForwardX11Trusted=no, connections made after ForwardX11Timeout
(hard-coded value of 1200secs in the Debian squeeze version of
OpenSSH) expired could be permitted and no longer subject to XSECURITY
restrictions because of an ineffective timeout check in ssh(1)
coupled with "fail open" behaviour in the X11 server when clients
attempted connections with expired credentials. This problem was
reported by Jann Horn.
We now reject X11 connections after the hard-coded Xauth cookie
expiration time of 1200 seconds.
CVE-2015-5600
It was found that OpenSSH would allow an attacker to request a large
number of keyboard-interactive devices when entering a password,
which could allow a remote attacker to bypass the MaxAuthTries limit
defined in the sshd_config file.
This flaw only affects OpenSSH configurations that have the
'KbdInteractiveAuthentication' configuration option set to 'yes'. By
default, this option has the same value as the
'ChallengeResponseAuthentication' option.
By default, all versions of Debian have the
'ChallengeResponseAuthentication' option set to 'no', meaning default
OpenSSH configurations are not affected by this flaw.
We now only query each keyboard-interactive device once per
authentication request regardless of how many times it is listed.
–
mike gabriel aka sunweaver (Debian Developer)
fon: +49 (1520) 1976 148
GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22 0782 9AF4 6B30 2577 1B31
mail: [email protected], http://sunweavers.net
Attachment:
signature.asc
Description: Digital signature
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | all | openssh | < 1:6.7p1-5+deb8u6 | openssh_1:6.7p1-5+deb8u6_all.deb |
Debian | 8 | i386 | openssh-client | < 1:6.7p1-5+deb8u6 | openssh-client_1:6.7p1-5+deb8u6_i386.deb |
Debian | 6 | i386 | openssh-server | < 1:5.5p1-6+squeeze6 | openssh-server_1:5.5p1-6+squeeze6_i386.deb |
Debian | 8 | i386 | ssh-askpass-gnome | < 1:6.7p1-5+deb8u6 | ssh-askpass-gnome_1:6.7p1-5+deb8u6_i386.deb |
Debian | 8 | armel | openssh-client-udeb | < 1:6.7p1-5+deb8u6 | openssh-client-udeb_1:6.7p1-5+deb8u6_armel.deb |
Debian | 8 | i386 | openssh-sftp-server | < 1:6.7p1-5+deb8u6 | openssh-sftp-server_1:6.7p1-5+deb8u6_i386.deb |
Debian | 6 | all | ssh-krb5 | < 1:5.5p1-6+squeeze6 | ssh-krb5_1:5.5p1-6+squeeze6_all.deb |
Debian | 8 | all | ssh-krb5 | < 1:6.7p1-5+deb8u6 | ssh-krb5_1:6.7p1-5+deb8u6_all.deb |
Debian | 8 | amd64 | openssh-server-udeb | < 1:6.7p1-5+deb8u6 | openssh-server-udeb_1:6.7p1-5+deb8u6_amd64.deb |
Debian | 6 | i386 | openssh-client | < 1:5.5p1-6+squeeze6 | openssh-client_1:5.5p1-6+squeeze6_i386.deb |