OpenSSH Ciphersuite Specification Information Disclosure Weakness

2011-09-09T00:00:00
ID OPENVAS:103247
Type openvas
Reporter This script is Copyright (C) 2011 Greenbone Networks GmbH
Modified 2017-08-30T00:00:00

Description

OpenSSH is prone to a security weakness that may allow attackers to downgrade the ciphersuite.

Successfully exploiting this issue in conjunction with other latent vulnerabilities may allow attackers to gain access to sensitive information that may aid in further attacks.

Releases prior to OpenSSH 2.9p2 are vulnerable.

                                        
                                            ###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_openssh_49473.nasl 7024 2017-08-30 11:51:43Z teissa $
#
# OpenSSH Ciphersuite Specification Information Disclosure Weakness
#
# Authors:
# Michael Meyer <michael.meyer@greenbone.net>
#
# Copyright:
# Copyright (c) 2011 Greenbone Networks GmbH
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

tag_summary = "OpenSSH is prone to a security weakness that may allow attackers to
downgrade the ciphersuite.

Successfully exploiting this issue in conjunction with other latent
vulnerabilities may allow attackers to gain access to sensitive
information that may aid in further attacks.

Releases prior to OpenSSH 2.9p2 are vulnerable.";

tag_solution = "Updates are available. Please see the references for more information.";

if (description)
{
 script_id(103247);
 script_version("$Revision: 7024 $");
 script_tag(name:"last_modification", value:"$Date: 2017-08-30 13:51:43 +0200 (Wed, 30 Aug 2017) $");
 script_tag(name:"creation_date", value:"2011-09-09 13:52:42 +0200 (Fri, 09 Sep 2011)");
 script_bugtraq_id(49473);
 script_cve_id("CVE-2001-0572");
 script_tag(name:"cvss_base", value:"7.5");
 script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_tag(name:"qod_type", value:"remote_banner_unreliable");

 script_name("OpenSSH Ciphersuite Specification Information Disclosure Weakness");

 script_xref(name : "URL" , value : "http://www.securityfocus.com/bid/49473");
 script_xref(name : "URL" , value : "http://www.openssh.com");
 script_xref(name : "URL" , value : "http://www.kb.cert.org/vuls/id/596827");

 script_category(ACT_GATHER_INFO);
 script_family("General");
 script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
 script_dependencies("ssh_detect.nasl");
 script_require_ports("Services/ssh", 22);
 script_tag(name : "solution" , value : tag_solution);
 script_tag(name : "summary" , value : tag_summary);
 script_mandatory_keys("openssh/detected");
 exit(0);
}

include("version_func.inc");
include("global_settings.inc");

port = get_kb_item("Services/ssh");
if(!port) port = 22;

if(!get_port_state(port))exit(0);

banner = get_kb_item("SSH/banner/" + port);
if ( ! banner ) exit(0);

version = eregmatch(pattern:"ssh-.*openssh[_-]{1}([0-9.]+[p0-9]*)", string: banner,icase:TRUE);
if(isnull(version[1]))exit(0);

if(version_is_less(version: version[1], test_version: "2.9p2")) {
 security_message(port);
 exit(0);
}

exit(0);