National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2008-5161 Detail

Description

Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors.

Source:  MITRE
Description Last Modified:  11/19/2008

Evaluator Description

http://securitytracker.com/alerts/2008/Nov/1021235.html CBC mode connections are affected

Impact

CVSS v2.0 Severity and Metrics:

Base Score: 2.6 LOW
Vector: (AV:N/AC:H/Au:N/C:P/I:N/A:N) (V2 legend)
Impact Subscore: 2.9
Exploitability Subscore: 4.9


Access Vector (AV): Network
Access Complexity (AC): High
Authentication (AU): None
Confidentiality (C): Partial
Integrity (I): None
Availability (A): None
Additional Information:
Allows unauthorized disclosure of information

Evaluator Solution

With a valid username and password patches are available at the following link: https://downloads.ssh.com/

Vendor Statements (disclaimer)

Official Statement from Red Hat (09/02/2009)

This issue was addressed for Red Hat Enterprise Linux 5 by https://rhn.redhat.com/errata/RHSA-2009-1287.html After reviewing the upstream fix for this issue, Red Hat does not intend to address this flaw in Red Hat Enterprise Linux 3 or 4 at this time.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
http://isc.sans.org/diary.html?storyid=5366
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
http://marc.info/?l=bugtraq&m=125017764422557&w=2
http://openssh.org/txt/cbc.adv
http://rhn.redhat.com/errata/RHSA-2009-1287.html
http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1
http://support.apple.com/kb/HT3937
http://support.attachmate.com/techdocs/2398.html
http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm
http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt
http://www.kb.cert.org/vuls/id/958563 US Government Resource
http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html
http://www.securityfocus.com/archive/1/498558/100/0/threaded
http://www.securityfocus.com/archive/1/498579/100/0/threaded
http://www.securityfocus.com/bid/32319
http://www.securitytracker.com/id?1021235
http://www.securitytracker.com/id?1021236
http://www.securitytracker.com/id?1021382
http://www.ssh.com/company/news/article/953/ Vendor Advisory
http://www.vupen.com/english/advisories/2008/3172
http://www.vupen.com/english/advisories/2008/3173
http://www.vupen.com/english/advisories/2008/3409
http://www.vupen.com/english/advisories/2009/1135
http://www.vupen.com/english/advisories/2009/3184
https://exchange.xforce.ibmcloud.com/vulnerabilities/46620
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
https://kc.mcafee.com/corporate/index?page=content&id=SB10106
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279

References to Check Content

Identifier:
oval:org.mitre.oval:def:11279
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:11279

Technical Details

Vulnerability Type (View All)

  • Information Leak / Disclosure (CWE-200)

Vulnerable software and versions Switch to CPE 2.2

Configuration 1
OR
cpe:2.3:a:openbsd:openssh:4.7p1:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.0:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.2:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.3:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.3.1j:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.3.2:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.3.2j:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.3.3:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.3.4:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.3.5:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.3.6:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.3.7:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.3.8k:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.3.9k:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.4:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.4.1:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.4.2:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.4.3:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.4.4:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.4.6:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.4.7:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.4.8:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.4.9:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.4.10:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:4.4.11:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.0.0f:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.0.1f:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.0.2f:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.0.3f:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.1.2:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.1.3:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.2.1:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.2.2:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.2.3:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.2.4:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.3.0:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.3.2:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.3.3:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.3.5:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.3.6:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.3.7:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:5.3.8:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_client:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:4.1.5:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:4.3.4:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:4.3.5:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:4.4.0:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:4.4.2:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:4.4.4:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:4.4.6:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:4.4.7:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:4.4.9:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:4.4.10:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:5.1.2:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:5.1.3:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:5.2.2:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:5.3.0:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:5.3.2:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:5.3.3:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:5.3.7:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connector:5.3.8:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connectsecure:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connectsecure:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connectsecure:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connectsecure:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_connectsecure:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_server:4.0:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_server:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_server:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_server:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:ssh:tectia_server:4.0.7:*:*:*:*:*:*:*
Showing 100 of 167 CPEs, view all CPEs here.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

8 change records found - show changes

Quick Info

CVE Dictionary Entry:
CVE-2008-5161
NVD Published Date:
11/19/2008
NVD Last Modified:
10/11/2018