ID

VAR-201508-0620


CVE

CVE-2015-5600


TITLE

Openssh of sshd of auth2-chall.c Inside kbdint_next_device Vulnerability to execute brute force attacks in functions

Trust: 0.8

sources: JVNDB: JVNDB-2015-003969

DESCRIPTION

The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list. Openssh of sshd of auth2-chall.c Inside kbdint_next_device The function is a keyboard interaction within a single connection (keyboard-interactive) The brute force is not adequately restricted for device processing. (brute-force) Attacks or service disruption (CPU Resource consumption ) There are vulnerabilities that are put into a state.By a third party ssh of -oKbdInteractiveDevices Brute force through an overly long and redundant list of options (brute-force) Attacks or service disruption (CPU Resource consumption ) There is a possibility of being put into a state. OpenSSH is prone to a security-bypass weakness. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. These vulnerabilities include: The SSLv3 vulnerability known as "Padding Oracle on Downgraded Legacy Encryption" also known as "POODLE", which could be exploited remotely resulting in disclosure of information. The following firmware versions of Virtual Connect (VC) are impacted: HPE BladeSystem c-Class Virtual Connect (VC) Firmware 4.30 through VC 4.45 HPE BladeSystem c-Class Virtual Connect (VC) Firmware 3.62 through VC 4.21 Note: Firmware versions 3.62 through 4.21 are not impacted by CVE-2016-0800, CVE-2015-3194, CVE-2014-3566, CVE-2015-0705, CVE-2016-0799, and CVE-2016-2842. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-SA-15:16.openssh Security Advisory The FreeBSD Project Topic: OpenSSH multiple vulnerabilities Category: contrib Module: openssh Announced: 2015-07-28, revised on 2015-07-30 Affects: All supported versions of FreeBSD. Corrected: 2015-07-28 19:58:44 UTC (stable/10, 10.2-PRERELEASE) 2015-07-28 19:58:44 UTC (stable/10, 10.2-BETA2-p2) 2015-07-28 19:59:04 UTC (releng/10.2, 10.2-RC1-p1) 2015-07-28 19:59:11 UTC (releng/10.1, 10.1-RELEASE-p16) 2015-07-28 19:58:54 UTC (stable/9, 9.3-STABLE) 2015-07-28 19:59:22 UTC (releng/9.3, 9.3-RELEASE-p21) 2015-07-30 10:09:07 UTC (stable/8, 8.4-STABLE) 2015-07-30 10:09:31 UTC (releng/8.4, 8.4-RELEASE-p36) CVE Name: CVE-2014-2653, CVE-2015-5600 For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit <URL:https://security.FreeBSD.org/>. 0. Revision history v1.0 2015-02-25 Initial release. v1.1 2015-07-30 Revised patch for FreeBSD 8.x to address regression when keyboard interactive authentication is used. I. Background OpenSSH is an implementation of the SSH protocol suite, providing an encrypted and authenticated transport for a variety of services, including remote shell access. The security of the SSH connection relies on the server authenticating itself to the client as well as the user authenticating itself to the server. SSH servers uses host keys to verify their identity. RFC 4255 has defined a method of verifying SSH host keys using Domain Name System Security (DNSSEC), by publishing the key fingerprint using DNS with "SSHFP" resource record. RFC 6187 has defined methods to use a signature by a trusted certification authority to bind a given public key to a given digital identity with X.509v3 certificates. The PAM (Pluggable Authentication Modules) library provides a flexible framework for user authentication and session setup / teardown. OpenSSH uses PAM for password authentication by default. II. Problem Description OpenSSH clients does not correctly verify DNS SSHFP records when a server offers a certificate. [CVE-2014-2653] OpenSSH servers which are configured to allow password authentication using PAM (default) would allow many password attempts. III. Impact A malicious server may be able to force a connecting client to skip DNS SSHFP record check and require the user to perform manual host verification of the host key fingerprint. This could allow man-in-the-middle attack if the user does not carefully check the fingerprint. [CVE-2014-2653] A remote attacker may effectively bypass MaxAuthTries settings, which would enable them to brute force passwords. [CVE-2015-5600] IV. Workaround Systems that do not use OpenSSH are not affected. There is no workaround for CVE-2014-2653, but the problem only affects networks where DNSsec and SSHFP is properly configured. Users who uses SSH should always check server host key fingerprints carefully when prompted. System administrators can set: UsePAM no In their /etc/ssh/sshd_config and restart sshd service to workaround the problem described as CVE-2015-5600 at expense of losing features provided by the PAM framework. We recommend system administrators to disable password based authentication completely, and use key based authentication exclusively in their SSH server configuration, when possible. This would eliminate the possibility of being ever exposed to password brute force attack. V. Solution Perform one of the following: 1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date. SSH service has to be restarted after the update. A reboot is recommended but not required. 2) To update your vulnerable system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install SSH service has to be restarted after the update. A reboot is recommended but not required. 3) To update your vulnerable system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. [FreeBSD 9.3, 10.1, 10.2] # fetch https://security.FreeBSD.org/patches/SA-15:16/openssh.patch # fetch https://security.FreeBSD.org/patches/SA-15:16/openssh.patch.asc # gpg --verify openssh.patch.asc [FreeBSD 8.4] # fetch https://security.FreeBSD.org/patches/SA-15:16/openssh-8.patch # fetch https://security.FreeBSD.org/patches/SA-15:16/openssh-8.patch.asc # gpg --verify openssh-8.patch.asc # fetch https://security.FreeBSD.org/patches/SA-15:16/openssh-8-errata.patc # fetch https://security.FreeBSD.org/patches/SA-15:16/openssh-8-errata.patch.asc # gpg --verify openssh-8-errata.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile the operating system using buildworld and installworld as described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>. Restart the SSH service, or reboot the system. VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/8/ r286067 releng/8.4/ r286068 stable/9/ r285977 releng/9.3/ r285980 stable/10/ r285976 releng/10.1/ r285979 releng/10.2/ r285978 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: <URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> VII. References <URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653> <URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5600> The latest revision of this advisory is available at <URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-15:16.openssh.asc> -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.1.6 (FreeBSD) iQIcBAEBCgAGBQJVufuCAAoJEO1n7NZdz2rnHHAQALfjXH/WyrgpHxw1YFipwFSD bl+HLbdvMVbfBxLV7eVBK9RPQiyoxwocmU0uMdiNEIWt2llczTLEl/wtUjj6f4Ko K6E7AAOgOX4zdQxBd2502FvXC1oNbDEvK8X3M4MzPHAG4QRgXNffRGYvClmbayck 2i+bjcHdKAEwFJjHk4wXOQ0yhdF6Q36bH0N3kPV9z7sAt3tuzSWhvtX6QQSyeuCJ ie2db9CdSUnFhYELJnVMpVTf3ppMqUT6QEe45LmsGA6F8yWdMaW2vtMdJq6xFVYP INCUVyOlDRu0TibjLUpXu4KugeDgyTXy9oz4SRdnpcUWz33fM6aSgOkpiM1h05ja BJrs0HZbkjCwtD+8a0buoyIKb9NBIsDKbrec5g8AEDkAHjRzraLGAXUYwkFeyqYJ j+ll5r5iu5fc4s8QM+ySlGCW8V9Ix8FX7Rr7FhAWLSKEldDsnCRjG4EfrAcd1HiC PleAnLv4uKwfSugIBIEs5ls7+TzWytW8nnEpMEerXUD894suFIycOT6eoUYF/CCT I1nHWSITw4HSj8+wBvrhxwZCRqIMOAZB+3jzrwRE+QZkghoWnPnqrCn9uLkdndq5 ewgz6PiuYC8Zx0Z6trA72oV+XjTKu2d6eO5tRpe9aAmhPmfBWg3fXYltVzTzF9IE r0z98qmTEPiTDi8dr+K/ =GsXJ -----END PGP SIGNATURE----- . Summary: Updated openssh packages that fix two security issues are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. These packages include the core files necessary for both the OpenSSH client and server. It was discovered that the OpenSSH server did not sanitize data received in requests to enable X11 forwarding. An authenticated client with restricted SSH access could possibly use this flaw to bypass intended restrictions. (CVE-2016-3115) It was discovered that the OpenSSH sshd daemon did not check the list of keyboard-interactive authentication methods for duplicates. (CVE-2015-5600) All openssh users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1245969 - CVE-2015-5600 openssh: MaxAuthTries limit bypass via duplicates in KbdInteractiveDevices 1316829 - CVE-2016-3115 openssh: missing sanitisation of input for X11 forwarding 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: openssh-5.3p1-114.el6_7.src.rpm i386: openssh-5.3p1-114.el6_7.i686.rpm openssh-askpass-5.3p1-114.el6_7.i686.rpm openssh-clients-5.3p1-114.el6_7.i686.rpm openssh-debuginfo-5.3p1-114.el6_7.i686.rpm openssh-server-5.3p1-114.el6_7.i686.rpm x86_64: openssh-5.3p1-114.el6_7.x86_64.rpm openssh-askpass-5.3p1-114.el6_7.x86_64.rpm openssh-clients-5.3p1-114.el6_7.x86_64.rpm openssh-debuginfo-5.3p1-114.el6_7.x86_64.rpm openssh-server-5.3p1-114.el6_7.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: openssh-debuginfo-5.3p1-114.el6_7.i686.rpm openssh-ldap-5.3p1-114.el6_7.i686.rpm pam_ssh_agent_auth-0.9.3-114.el6_7.i686.rpm x86_64: openssh-debuginfo-5.3p1-114.el6_7.i686.rpm openssh-debuginfo-5.3p1-114.el6_7.x86_64.rpm openssh-ldap-5.3p1-114.el6_7.x86_64.rpm pam_ssh_agent_auth-0.9.3-114.el6_7.i686.rpm pam_ssh_agent_auth-0.9.3-114.el6_7.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: openssh-5.3p1-114.el6_7.src.rpm x86_64: openssh-5.3p1-114.el6_7.x86_64.rpm openssh-clients-5.3p1-114.el6_7.x86_64.rpm openssh-debuginfo-5.3p1-114.el6_7.x86_64.rpm openssh-server-5.3p1-114.el6_7.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: openssh-askpass-5.3p1-114.el6_7.x86_64.rpm openssh-debuginfo-5.3p1-114.el6_7.i686.rpm openssh-debuginfo-5.3p1-114.el6_7.x86_64.rpm openssh-ldap-5.3p1-114.el6_7.x86_64.rpm pam_ssh_agent_auth-0.9.3-114.el6_7.i686.rpm pam_ssh_agent_auth-0.9.3-114.el6_7.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: openssh-5.3p1-114.el6_7.src.rpm i386: openssh-5.3p1-114.el6_7.i686.rpm openssh-askpass-5.3p1-114.el6_7.i686.rpm openssh-clients-5.3p1-114.el6_7.i686.rpm openssh-debuginfo-5.3p1-114.el6_7.i686.rpm openssh-server-5.3p1-114.el6_7.i686.rpm ppc64: openssh-5.3p1-114.el6_7.ppc64.rpm openssh-askpass-5.3p1-114.el6_7.ppc64.rpm openssh-clients-5.3p1-114.el6_7.ppc64.rpm openssh-debuginfo-5.3p1-114.el6_7.ppc64.rpm openssh-server-5.3p1-114.el6_7.ppc64.rpm s390x: openssh-5.3p1-114.el6_7.s390x.rpm openssh-askpass-5.3p1-114.el6_7.s390x.rpm openssh-clients-5.3p1-114.el6_7.s390x.rpm openssh-debuginfo-5.3p1-114.el6_7.s390x.rpm openssh-server-5.3p1-114.el6_7.s390x.rpm x86_64: openssh-5.3p1-114.el6_7.x86_64.rpm openssh-askpass-5.3p1-114.el6_7.x86_64.rpm openssh-clients-5.3p1-114.el6_7.x86_64.rpm openssh-debuginfo-5.3p1-114.el6_7.x86_64.rpm openssh-server-5.3p1-114.el6_7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: openssh-debuginfo-5.3p1-114.el6_7.i686.rpm openssh-ldap-5.3p1-114.el6_7.i686.rpm pam_ssh_agent_auth-0.9.3-114.el6_7.i686.rpm ppc64: openssh-debuginfo-5.3p1-114.el6_7.ppc.rpm openssh-debuginfo-5.3p1-114.el6_7.ppc64.rpm openssh-ldap-5.3p1-114.el6_7.ppc64.rpm pam_ssh_agent_auth-0.9.3-114.el6_7.ppc.rpm pam_ssh_agent_auth-0.9.3-114.el6_7.ppc64.rpm s390x: openssh-debuginfo-5.3p1-114.el6_7.s390.rpm openssh-debuginfo-5.3p1-114.el6_7.s390x.rpm openssh-ldap-5.3p1-114.el6_7.s390x.rpm pam_ssh_agent_auth-0.9.3-114.el6_7.s390.rpm pam_ssh_agent_auth-0.9.3-114.el6_7.s390x.rpm x86_64: openssh-debuginfo-5.3p1-114.el6_7.i686.rpm openssh-debuginfo-5.3p1-114.el6_7.x86_64.rpm openssh-ldap-5.3p1-114.el6_7.x86_64.rpm pam_ssh_agent_auth-0.9.3-114.el6_7.i686.rpm pam_ssh_agent_auth-0.9.3-114.el6_7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: openssh-5.3p1-114.el6_7.src.rpm i386: openssh-5.3p1-114.el6_7.i686.rpm openssh-askpass-5.3p1-114.el6_7.i686.rpm openssh-clients-5.3p1-114.el6_7.i686.rpm openssh-debuginfo-5.3p1-114.el6_7.i686.rpm openssh-server-5.3p1-114.el6_7.i686.rpm x86_64: openssh-5.3p1-114.el6_7.x86_64.rpm openssh-askpass-5.3p1-114.el6_7.x86_64.rpm openssh-clients-5.3p1-114.el6_7.x86_64.rpm openssh-debuginfo-5.3p1-114.el6_7.x86_64.rpm openssh-server-5.3p1-114.el6_7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: openssh-debuginfo-5.3p1-114.el6_7.i686.rpm openssh-ldap-5.3p1-114.el6_7.i686.rpm pam_ssh_agent_auth-0.9.3-114.el6_7.i686.rpm x86_64: openssh-debuginfo-5.3p1-114.el6_7.i686.rpm openssh-debuginfo-5.3p1-114.el6_7.x86_64.rpm openssh-ldap-5.3p1-114.el6_7.x86_64.rpm pam_ssh_agent_auth-0.9.3-114.el6_7.i686.rpm pam_ssh_agent_auth-0.9.3-114.el6_7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5600 https://access.redhat.com/security/cve/CVE-2016-3115 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. ============================================================================ Ubuntu Security Notice USN-2710-1 August 14, 2015 openssh vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 15.04 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS Summary: Several security issues were fixed in OpenSSH. If an additional vulnerability were discovered in the OpenSSH unprivileged child process, this issue could allow a remote attacker to perform user impersonation. (CVE number pending) Moritz Jodeit discovered that OpenSSH incorrectly handled context memory when using PAM authentication. If an additional vulnerability were discovered in the OpenSSH unprivileged child process, this issue could allow a remote attacker to bypass authentication or possibly execute arbitrary code. (CVE number pending) Jann Horn discovered that OpenSSH incorrectly handled time windows for X connections. (CVE-2015-5600) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 15.04: openssh-server 1:6.7p1-5ubuntu1.2 Ubuntu 14.04 LTS: openssh-server 1:6.6p1-2ubuntu2.2 Ubuntu 12.04 LTS: openssh-server 1:5.9p1-5ubuntu1.6 In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n a-c05128992 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05128992 Version: 1 HPSBST03599 rev.1 - HPE 3PAR OS running OpenSSH, Remote Denial of Service (DoS), Access Restriction Bypass NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2016-05-11 Last Updated: 2016-05-11 Potential Security Impact: Remote Access Restriction Bypass, Denial of Service (DoS) Source: Hewlett Packard Enterprise, Product Security Response Team VULNERABILITY SUMMARY A vulnerability in OpenSSH has been addressed by HPE 3PAR OS. The vulnerabily could be exploited remotely resulting in Denial of Service (DoS) or access restriction bypass. References: - CVE-2015-5600 - PSRT110106 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HPE 3PAR OS versions 3.1.3 and later, prior to 3.2.1 MU5 and 3.2.2 MU2 running OpenSSH BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2015-5600 (AV:N/AC:L/Au:N/C:P/I:N/A:C) 8.5 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HPE has provided the following software updates and mitigation information to resolve the vulnerability in 3PAR OS running OpenSSH. + 3PAR OS 3.2.1 MU5 and 3.2.2 MU2 - HPE recommends prior impacted versions update to 3PAR OS 3.2.1 MU5 or 3.2.2 MU2. + 3PAR OS 3.1.3 is also vulnerable but will not be fixed. **Mitigation:** The best protection to guard against exploitation of this vulnerability is to securely configure and operate the storage array in accordance with the *HPE 3PAR Configuration Guidelines* documentation. Please contact HPE Technical Support for assistance. HISTORY Version:1 (rev.1) - 11 May 2016 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability with any HPE supported product, send Email to: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. VCX prior to 9.8.18 with OpenSSH or ISC BIND. + VCX 9.8.18 for the following Products/SKUs: - J9672A HP VCX V7205 Platform w/ DL360 G7 Srvr - J9668A HP VCX IPC V7005 Pltfrm w/ DL120 G6 Srvr - JC517A HP VCX V7205 Platform w/DL 360 G6 Server - JE355A HP VCX V6000 Branch Platform 9.0 - JC516A HP VCX V7005 Platform w/DL 120 G6 Server - JC518A HP VCX Connect 200 Primry 120 G6 Server - J9669A HP VCX IPC V7310 Pltfrm w/ DL360 G7 Srvr - JE341A HP VCX Connect 100 Secondary - JE252A HP VCX Connect Primary MIM Module - JE253A HP VCX Connect Secondary MIM Module - JE254A HP VCX Branch MIM Module - JE355A HP VCX V6000 Branch Platform 9.0 - JD028A HP MS30-40 RTR w/VCX + T1/FXO/FXS/Mod - JD023A HP MSR30-40 Router with VCX MIM Module - JD024A HP MSR30-16 RTR w/VCX Ent Br Com MIM - JD025A HP MSR30-16 RTR w/VCX + 4FXO/2FXS Mod - JD026A HP MSR30-16 RTR w/VCX + 8FXO/4FXS Mod - JD027A HP MSR30-16 RTR w/VCX + 8BRI/4FXS Mod - JD029A HP MSR30-16 RTR w/VCX + E1/4BRI/4FXS - JE340A HP VCX Connect 100 Pri Server 9.0 - JE342A HP VCX Connect 100 Sec Server 9.0 HISTORY Version:1 (rev.1) - 28 January 2016 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201512-04 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: OpenSSH: Multiple vulnerabilities Date: December 20, 2015 Bugs: #553724, #555518, #557340 ID: 201512-04 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in OpenSSH, the worst of which could lead to arbitrary code execution, or cause a Denial of Service condition. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/openssh < 7.1_p1-r2 >= 7.1_p1-r2 Description =========== Multiple vulnerabilities have been discovered in OpenSSH. Please review the CVE identifiers referenced below for details. Impact ====== Workaround ========== There is no known workaround at this time. Resolution ========== All OpenSSH users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/openssh-6.9_p1-r2" References ========== [ 1 ] CVE-2015-5352 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5352 [ 2 ] CVE-2015-5600 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5600 [ 3 ] CVE-2015-6563 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6563 [ 4 ] CVE-2015-6564 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6564 [ 5 ] CVE-2015-6565 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6565 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201512-04 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.61

sources: NVD: CVE-2015-5600 // JVNDB: JVNDB-2015-003969 // BID: 75990 // VULMON: CVE-2015-5600 // PACKETSTORM: 137294 // PACKETSTORM: 132875 // PACKETSTORM: 136331 // PACKETSTORM: 133087 // PACKETSTORM: 136977 // PACKETSTORM: 135505 // PACKETSTORM: 135009

AFFECTED PRODUCTS

vendor:openbsdmodel:opensshscope:lteversion:6.9

Trust: 1.8

vendor:oraclemodel:integrated lights out managerscope:eqversion:3.2

Trust: 1.1

vendor:oraclemodel:integrated lights out managerscope:eqversion:3.1

Trust: 1.1

vendor:oraclemodel:integrated lights out managerscope:eqversion:3.0

Trust: 1.1

vendor:applemodel:mac os xscope:eqversion:10.10 to 10.10.4

Trust: 0.8

vendor:hitachimodel:big-ipscope:eqversion:1500

Trust: 0.8

vendor:openbsdmodel:opensshscope:eqversion:6.9

Trust: 0.6

vendor:ubuntumodel:linuxscope:eqversion:15.04

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:redhatmodel:enterprise linux workstation optionalscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux server optionalscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node optionalscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop optionalscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.4

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.3

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.2

Trust: 0.3

vendor:oraclemodel:linuxscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:opensshmodel:6.9p1scope: - version: -

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.4.13

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.3.28

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.4.2.1

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.4.2

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.4.1

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.4.0

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.3.2.9.

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.3.2.9

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.3.2.6

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.3.2.4

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.3.2.2

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.3.2.10

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.3.2

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.2.0.9

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.1.5.2

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.1.5.1

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.0.0

Trust: 0.3

vendor:junipermodel:nsmexpressscope:eqversion: -

Trust: 0.3

vendor:junipermodel:nsm4000scope:eqversion:0

Trust: 0.3

vendor:junipermodel:nsm3000scope:eqversion: -

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:5.3.2

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:5.3.1

Trust: 0.3

vendor:ibmmodel:security network protectionscope:eqversion:5.2.0

Trust: 0.3

vendor:ibmmodel:qlogic virtual fabric extension module for ibm bladecenterscope:eqversion:9.0

Trust: 0.3

vendor:ibmmodel:qlogic 8gb intelligent pass-thru module and san switch modulescope:eqversion:7.10

Trust: 0.3

vendor:ibmmodel:proventia network enterprise scannerscope:eqversion:2.3

Trust: 0.3

vendor:ibmmodel:flex system fc43171 8gb san switch and san pass-thruscope:eqversion:9.1

Trust: 0.3

vendor:ibmmodel:bladecenter advanced management module 3.66nscope: - version: -

Trust: 0.3

vendor:hpmodel:vcxscope:eqversion:9.8.17

Trust: 0.3

vendor:hpmodel:bladesystem c-class virtual connectscope:eqversion:4.45

Trust: 0.3

vendor:hpmodel:bladesystem c-class virtual connectscope:eqversion:4.30

Trust: 0.3

vendor:hpmodel:bladesystem c-class virtual connectscope:eqversion:4.21

Trust: 0.3

vendor:hpmodel:bladesystem c-class virtual connectscope:eqversion:3.62

Trust: 0.3

vendor:hpmodel:3par osscope:eqversion:3.1.3

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-stablescope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p9scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p6scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p5scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p3scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p2scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p13scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p10scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p9scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p8scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p7scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p4scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p27scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p24scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p23scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p20scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p19scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p17scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p16scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p15scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p14scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p13scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p12scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p11scope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:8.4

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:10.2

Trust: 0.3

vendor:freebsdmodel:10.1-release-p9scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.1-release-p6scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.1-release-p5scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.1-release-p1scope: - version: -

Trust: 0.3

vendor:f5model:big-ip gv0lb151-20nnnn1scope:eqversion:150010.0.1

Trust: 0.3

vendor:f5model:big-ip gv0lb151-20nnnn1scope:eqversion:15009.3.1

Trust: 0.3

vendor:f5model:big-ip gv0lb151-20nnnn1scope:eqversion:15009.1.3

Trust: 0.3

vendor:f5model:big-ip gv0lb151-10nnnn1scope:eqversion:150010.0.1

Trust: 0.3

vendor:f5model:big-ip gv0lb151-10nnnn1scope:eqversion:15009.3.1

Trust: 0.3

vendor:f5model:big-ip gv0lb151-10nnnn1scope:eqversion:15009.1.3

Trust: 0.3

vendor:f5model:big-ip gv0lb150-20nnnn0scope:eqversion:150010.0.1

Trust: 0.3

vendor:f5model:big-ip gv0lb150-20nnnn0scope:eqversion:15009.3.1

Trust: 0.3

vendor:f5model:big-ip gv0lb150-20nnnn0scope:eqversion:15009.1.3

Trust: 0.3

vendor:f5model:big-ip gv0lb150-10nnnn0scope:eqversion:150010.0.1

Trust: 0.3

vendor:f5model:big-ip gv0lb150-10nnnn0scope:eqversion:15009.3.1

Trust: 0.3

vendor:f5model:big-ip gv0lb150-10nnnn0scope:eqversion:15009.1.3

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:7

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10

Trust: 0.3

vendor:ibmmodel:qlogic virtual fabric extension module for ibm bladecenterscope:neversion:9.0.3.14.0

Trust: 0.3

vendor:ibmmodel:qlogic 8gb intelligent pass-thru module and san switch modulescope:neversion:7.10.1.37.00

Trust: 0.3

vendor:ibmmodel:flex system fc43171 8gb san switch and san pass-thruscope:neversion:9.1.7.01.00

Trust: 0.3

vendor:ibmmodel:bladecenter advanced management module 3.66pscope:neversion: -

Trust: 0.3

vendor:hpmodel:vcxscope:neversion:9.8.18

Trust: 0.3

vendor:hpmodel:bladesystem c-class virtual connectscope:neversion:4.50

Trust: 0.3

vendor:hpmodel:3par os mu2scope:neversion:3.2.2

Trust: 0.3

vendor:hpmodel:3par os mu5scope:neversion:3.2.1

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.10.5

Trust: 0.3

sources: BID: 75990 // JVNDB: JVNDB-2015-003969 // CNNVD: CNNVD-201508-001 // NVD: CVE-2015-5600

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-5600
value: HIGH

Trust: 1.0

NVD: CVE-2015-5600
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201508-001
value: MEDIUM

Trust: 0.6

VULMON: CVE-2015-5600
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-5600
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 7.8
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

sources: VULMON: CVE-2015-5600 // JVNDB: JVNDB-2015-003969 // CNNVD: CNNVD-201508-001 // NVD: CVE-2015-5600

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.8

sources: JVNDB: JVNDB-2015-003969 // NVD: CVE-2015-5600

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 136331 // PACKETSTORM: 133087 // CNNVD: CNNVD-201508-001

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-201508-001

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-003969

PATCH

title:APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update 2015-006url:http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html

Trust: 0.8

title:HT205031url:https://support.apple.com/en-us/HT205031

Trust: 0.8

title:HT205031url:https://support.apple.com/ja-jp/HT205031

Trust: 0.8

title:CVS log for src/usr.bin/ssh/auth2-chall.curl:http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth2-chall.c

Trust: 0.8

title:Diff for /src/usr.bin/ssh/auth2-chall.c between version 1.42 and 1.43url:http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth2-chall.c.diff?r1=1.42&r2=1.43&f=h

Trust: 0.8

title:Oracle Critical Patch Update Advisory - July 2016url:http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

Trust: 0.8

title:Text Form of Oracle Critical Patch Update - July 2016 Risk Matricesurl:http://www.oracle.com/technetwork/topics/security/cpujul2016verbose-2881721.html

Trust: 0.8

title:Oracle Solaris Third Party Bulletin - October 2015url:http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html

Trust: 0.8

title:July 2016 Critical Patch Update Releasedurl:https://blogs.oracle.com/security/entry/july_2016_critical_patch_update

Trust: 0.8

title:OpenSSHの脆弱性(CVE-2015-5600)によるBIG-IP1500への影響についてurl:http://www.hitachi.co.jp/products/it/server/security/info/vulnerable/openssh_cve20155600_big.html

Trust: 0.8

title:auth2-challurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=57086

Trust: 0.6

title:Red Hat: Moderate: openssh security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20152088 - Security Advisory

Trust: 0.1

title:Debian CVElist Bug Report Logs: openssh: CVE-2015-5352: XSECURITY restrictions bypass under certain conditions in sshurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=cb1cb0a27af47a61a0356f0de0943be8

Trust: 0.1

title:Debian CVElist Bug Report Logs: openssh: CVE-2015-5600: MaxAuthTries limit bypass via duplicates in KbdInteractiveDevicesurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=6ddb8aa51aaa09b7fbd5a473e33cd0f9

Trust: 0.1

title:Ubuntu Security Notice: openssh vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2710-1

Trust: 0.1

title:Ubuntu Security Notice: openssh regressionurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2710-2

Trust: 0.1

title:Red Hat: CVE-2015-5600url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2015-5600

Trust: 0.1

title:Debian CVElist Bug Report Logs: openssh: CVE-2015-6563 CVE-2015-6564url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=73eb91ff53511af2767cd29878bd74dc

Trust: 0.1

title:Amazon Linux AMI: ALAS-2015-625url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2015-625

Trust: 0.1

title:Symantec Security Advisories: SA104 : OpenSSH Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=b643e473a764678a8d1ded300d5699b6

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - April 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=83bbd91f8369c8f064e6d68dac68400f

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - October 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=435ed9abc2fb1e74ce2a69605a01e326

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - July 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=3a04485ebb79f7fbc2472bf9af5ce489

Trust: 0.1

title:Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - July 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins&qid=6c15273f6bf4a785175f27073b98a1ce

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - July 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=5f8c525f1408011628af1792207b2099

Trust: 0.1

title:Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - October 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=92308e3c4d305e91c2eba8c9c6835e83

Trust: 0.1

title:Final_Project_CyberBootcampurl:https://github.com/pboonman196/Final_Project_CyberBootcamp

Trust: 0.1

title:IDS-Evasionurl:https://github.com/ahm3dhany/IDS-Evasion

Trust: 0.1

title:clair-laburl:https://github.com/sjourdan/clair-lab

Trust: 0.1

title:DC-2-Vulnhub-Walkthroughurl:https://github.com/vshaliii/DC-2-Vulnhub-Walkthrough

Trust: 0.1

title:DC-1-Vulnhub-Walkthroughurl:https://github.com/vshaliii/DC-1-Vulnhub-Walkthrough

Trust: 0.1

sources: VULMON: CVE-2015-5600 // JVNDB: JVNDB-2015-003969 // CNNVD: CNNVD-201508-001

EXTERNAL IDS

db:NVDid:CVE-2015-5600

Trust: 3.5

db:OPENWALLid:OSS-SECURITY/2015/07/23/4

Trust: 2.5

db:BIDid:75990

Trust: 2.0

db:MCAFEEid:SB10157

Trust: 1.7

db:MCAFEEid:SB10136

Trust: 1.7

db:BIDid:92012

Trust: 1.7

db:BIDid:91787

Trust: 1.7

db:SIEMENSid:SSA-412672

Trust: 1.7

db:SECTRACKid:1032988

Trust: 1.7

db:JUNIPERid:JSA10697

Trust: 1.7

db:JVNDBid:JVNDB-2015-003969

Trust: 0.8

db:CNNVDid:CNNVD-201508-001

Trust: 0.6

db:JUNIPERid:JSA10774

Trust: 0.3

db:MCAFEEid:SB10164

Trust: 0.3

db:ICS CERTid:ICSA-22-349-21

Trust: 0.1

db:VULMONid:CVE-2015-5600

Trust: 0.1

db:PACKETSTORMid:137294

Trust: 0.1

db:PACKETSTORMid:132875

Trust: 0.1

db:PACKETSTORMid:136331

Trust: 0.1

db:PACKETSTORMid:133087

Trust: 0.1

db:PACKETSTORMid:136977

Trust: 0.1

db:PACKETSTORMid:135505

Trust: 0.1

db:PACKETSTORMid:135009

Trust: 0.1

sources: VULMON: CVE-2015-5600 // BID: 75990 // JVNDB: JVNDB-2015-003969 // PACKETSTORM: 137294 // PACKETSTORM: 132875 // PACKETSTORM: 136331 // PACKETSTORM: 133087 // PACKETSTORM: 136977 // PACKETSTORM: 135505 // PACKETSTORM: 135009 // CNNVD: CNNVD-201508-001 // NVD: CVE-2015-5600

REFERENCES

url:http://openwall.com/lists/oss-security/2015/07/23/4

Trust: 2.5

url:http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

Trust: 2.0

url:http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

Trust: 2.0

url:http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html

Trust: 2.0

url:http://rhn.redhat.com/errata/rhsa-2016-0466.html

Trust: 1.8

url:https://security.gentoo.org/glsa/201512-04

Trust: 1.8

url:http://www.ubuntu.com/usn/usn-2710-1

Trust: 1.8

url:http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth2-chall.c.diff?r1=1.42&r2=1.43&f=h

Trust: 1.7

url:http://seclists.org/fulldisclosure/2015/jul/92

Trust: 1.7

url:http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth2-chall.c

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2015/aug/msg00001.html

Trust: 1.7

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-july/162955.html

Trust: 1.7

url:https://support.apple.com/kb/ht205031

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05157667

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05128992

Trust: 1.7

url:http://www.securityfocus.com/bid/91787

Trust: 1.7

url:http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html

Trust: 1.7

url:http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html

Trust: 1.7

url:http://www.securityfocus.com/bid/75990

Trust: 1.7

url:http://www.securityfocus.com/bid/92012

Trust: 1.7

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10157

Trust: 1.7

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04952480

Trust: 1.7

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10697

Trust: 1.7

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10136

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html

Trust: 1.7

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-august/165170.html

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-2710-2

Trust: 1.7

url:http://www.securitytracker.com/id/1032988

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20151106-0001/

Trust: 1.7

url:http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html

Trust: 1.7

url:https://www.arista.com/en/support/advisories-notices/security-advisories/1174-security-advisory-12

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5600

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-5600

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2015-5600

Trust: 0.7

url:http://seclists.org/oss-sec/2015/q3/156

Trust: 0.3

url:http://seclists.org/bugtraq/2015/jul/134

Trust: 0.3

url:http://seclists.org/bugtraq/2015/jul/141

Trust: 0.3

url:http://www.openssh.com

Trust: 0.3

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10774&actp=rss

Trust: 0.3

url:http://prod.lists.apple.com/archives/security-announce/2015/aug/msg00001.html

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04952480

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05157667

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05128992

Trust: 0.3

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10164

Trust: 0.3

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5099240

Trust: 0.3

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098977

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21969670

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21980969

Trust: 0.3

url:http://www.hitachi.co.jp/products/it/server/security/global/info/vulnerable/openssh_cve20155600_big.html

Trust: 0.3

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n

Trust: 0.3

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.3

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2015-5600

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-5352

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/264.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2015:2088

Trust: 0.1

url:https://github.com/pboonman196/final_project_cyberbootcamp

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/2710-1/

Trust: 0.1

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-21

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=40178

Trust: 0.1

url:http://h20564.www2.hpe.com/hpsc/swd/public

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3194

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0705

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-5161

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1789

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-0800

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2842

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1791

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3566

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-0799

Trust: 0.1

url:https://www.freebsd.org/handbook/makeworld.html>.

Trust: 0.1

url:https://security.freebsd.org/>.

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5600>

Trust: 0.1

url:https://security.freebsd.org/patches/sa-15:16/openssh.patch.asc

Trust: 0.1

url:https://security.freebsd.org/patches/sa-15:16/openssh.patch

Trust: 0.1

url:https://security.freebsd.org/patches/sa-15:16/openssh-8-errata.patc

Trust: 0.1

url:https://security.freebsd.org/patches/sa-15:16/openssh-8-errata.patch.asc

Trust: 0.1

url:https://security.freebsd.org/advisories/freebsd-sa-15:16.openssh.asc>

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2653>

Trust: 0.1

url:https://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-2653

Trust: 0.1

url:https://security.freebsd.org/patches/sa-15:16/openssh-8.patch.asc

Trust: 0.1

url:https://security.freebsd.org/patches/sa-15:16/openssh-8.patch

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-3115

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-3115

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openssh/1:5.9p1-5ubuntu1.6

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openssh/1:6.7p1-5ubuntu1.2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openssh/1:6.6p1-2ubuntu2.2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5477

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5722

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5352

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6565

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6565

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6563

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6564

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5600

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6563

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-6564

Trust: 0.1

sources: VULMON: CVE-2015-5600 // BID: 75990 // JVNDB: JVNDB-2015-003969 // PACKETSTORM: 137294 // PACKETSTORM: 132875 // PACKETSTORM: 136331 // PACKETSTORM: 133087 // PACKETSTORM: 136977 // PACKETSTORM: 135505 // PACKETSTORM: 135009 // CNNVD: CNNVD-201508-001 // NVD: CVE-2015-5600

CREDITS

king cope

Trust: 0.3

sources: BID: 75990

SOURCES

db:VULMONid:CVE-2015-5600
db:BIDid:75990
db:JVNDBid:JVNDB-2015-003969
db:PACKETSTORMid:137294
db:PACKETSTORMid:132875
db:PACKETSTORMid:136331
db:PACKETSTORMid:133087
db:PACKETSTORMid:136977
db:PACKETSTORMid:135505
db:PACKETSTORMid:135009
db:CNNVDid:CNNVD-201508-001
db:NVDid:CVE-2015-5600

LAST UPDATE DATE

2024-11-07T19:26:33.272000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2015-5600date:2022-12-13T00:00:00
db:BIDid:75990date:2017-01-23T00:06:00
db:JVNDBid:JVNDB-2015-003969date:2016-07-27T00:00:00
db:CNNVDid:CNNVD-201508-001date:2022-12-14T00:00:00
db:NVDid:CVE-2015-5600date:2022-12-13T12:15:17.307

SOURCES RELEASE DATE

db:VULMONid:CVE-2015-5600date:2015-08-03T00:00:00
db:BIDid:75990date:2015-07-22T00:00:00
db:JVNDBid:JVNDB-2015-003969date:2015-08-04T00:00:00
db:PACKETSTORMid:137294date:2016-06-02T16:22:00
db:PACKETSTORMid:132875date:2015-07-28T22:22:22
db:PACKETSTORMid:136331date:2016-03-22T00:06:00
db:PACKETSTORMid:133087date:2015-08-14T20:53:10
db:PACKETSTORMid:136977date:2016-05-12T16:07:26
db:PACKETSTORMid:135505date:2016-01-29T20:34:00
db:PACKETSTORMid:135009date:2015-12-21T23:23:00
db:CNNVDid:CNNVD-201508-001date:2015-08-03T00:00:00
db:NVDid:CVE-2015-5600date:2015-08-03T01:59:03.950