Lucene search

K
packetstormRembrandtPACKETSTORM:73600
HistoryApr 21, 2007 - 12:00 a.m.

OpenSSH s/key Weakness

2007-04-2100:00:00
Rembrandt
packetstormsecurity.com
715

0.008 Low

EPSS

Percentile

78.8%

` _ _ _____ _ ___ _____ _ _  
/ / / / ____/ / / _/_ __/ / / /  
/ /_/ / __/ / / / / / / / /_/ /  
/ __ / /___/ /____/ / / / / __ /  
/_/ /_/_____/_____/___/ /_/ /_/ /_/  
Helith - 0815  
--------------------------------------------------------------------------------  
  
Author : Rembrandt  
Date : 2007-04-21  
Affected Software: openssh (propably other implementations as well)  
Affected OS : any  
Type : Information Disclosure  
  
OSVDB : 34600  
CVE : 2007-2243  
ISS X-Force: : 33794  
BID : 23601  
  
  
OpenSSH, when configured to use S/KEY authentication, is prone to a remote  
information disclosure weakness. The issue occurs due to the S/KEY   
challenge/response system being used for valid accounts. If a remote attacker  
systematically attempsauthentication against a list of usernames, he can watch  
the response to determine which accounts are valid.  
  
If "ChallengeResponseAuthentication" is set to "Yes", which is the default  
setting, OpenSSH allows the user to login by using S/KEY in the form of  
'ssh userid:skey at hostname'.  
  
  
Steps to reproduce:  
  
$ ssh user@somewhere  
Permission denied (publickey,keyboard-interactive).  
$ ssh user:skey@somewhere   
otp-md5 99 some04578  
S/Key Password:  
  
$   
  
  
If the useraccount exist but is not configured to use S/KEY or if the   
useraccount does not exist at the specific system the response looks normal.  
  
  
$ ssh testuser:skey@somewhere  
Permission denied (publickey,keyboard-interactive).   
  
  
As you can see clearly OpenSSH discloses the existence of system accounts.  
  
  
Kind regards,  
Rembrandt   
`

0.008 Low

EPSS

Percentile

78.8%