Lucene search

K
mageiaGentoo FoundationMGASA-2015-0295
HistoryJul 29, 2015 - 12:01 a.m.

Updated openssh package fixes security vulnerability

2015-07-2900:01:59
Gentoo Foundation
advisories.mageia.org
34

CVSS2

8.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:P/I:N/A:C

EPSS

0.363

Percentile

97.2%

The OpenSSH server, when keyboard-interactive challenge response authentication is enabled and PAM is being used (the default configuration in Mageia), can be tricked into allowing more password attempts than the MaxAuthTries setting would normally allow in one connection, which can aid an attacker in brute-force password guessing (CVE-2015-5600).

OSVersionArchitecturePackageVersionFilename
Mageia4noarchopenssh< 6.2p2-3.4openssh-6.2p2-3.4.mga4
Mageia5noarchopenssh< 6.6p1-5.3openssh-6.6p1-5.3.mga5

CVSS2

8.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:P/I:N/A:C

EPSS

0.363

Percentile

97.2%