OpenSSH < 5.2 CBC Plaintext Disclosure

This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.


Synopsis :

The SSH service running on the remote host has an information
disclosure vulnerability.

Description :

The version of OpenSSH running on the remote host has an information
disclosure vulnerability. A design flaw in the SSH specification
could allow a man-in-the-middle attacker to recover up to 32 bits of
plaintext from an SSH-protected connection in the standard
configuration. An attacker could exploit this to gain access to
sensitive information.

See also :

http://www.nessus.org/u?4984aeb9
http://www.openssh.com/txt/cbc.adv
http://www.openssh.com/txt/release-5.2

Solution :

Upgrade to OpenSSH 5.2 or later.

Risk factor :

Medium / CVSS Base Score : 4.0
(CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N)
CVSS Temporal Score : 3.5
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Misc.

Nessus Plugin ID: 44065 ()

Bugtraq ID: 32319

CVE ID: CVE-2008-5161