Lucene search

K
mageiaGentoo FoundationMGASA-2015-0295
HistoryJul 29, 2015 - 12:01 a.m.

Updated openssh package fixes security vulnerability

2015-07-2900:01:59
Gentoo Foundation
advisories.mageia.org
17

8.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:P/I:N/A:C

0.164 Low

EPSS

Percentile

95.9%

The OpenSSH server, when keyboard-interactive challenge response authentication is enabled and PAM is being used (the default configuration in Mageia), can be tricked into allowing more password attempts than the MaxAuthTries setting would normally allow in one connection, which can aid an attacker in brute-force password guessing (CVE-2015-5600).

OSVersionArchitecturePackageVersionFilename
Mageia4noarchopenssh< 6.2p2-3.4openssh-6.2p2-3.4.mga4
Mageia5noarchopenssh< 6.6p1-5.3openssh-6.6p1-5.3.mga5

8.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:P/I:N/A:C

0.164 Low

EPSS

Percentile

95.9%