OpenSSH < 4.2p1 GSSAPI Authentication Credential Escalation

medium Nessus Network Monitor Plugin ID 3205

Synopsis

The remote host is vulnerable to a flaw that allows attackers to retrieve sensitive files or data.

Description

The remote host is running a version of OpenSSH which is vulnerable to a flaw in the way that it handles GSSAPI authentication. Specifically, if GSSAPI is enabled and 'GSSAPIDelegateCredentials' is enabled, an attacker may gain access to GSSAPI credentials.

Note: NNM has solely relied on the banner of the SSH client to perform this check. Any backported patches or workarounds such as recompiling or edited configurations are not observable through the banner.

Solution

Upgrade to version 4.2p1 or higher.

Plugin Details

Severity: Medium

ID: 3205

Family: SSH

Published: 9/6/2005

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: Low

Base Score: 3.3

Temporal Score: 2.9

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 4.1

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:openbsd:openssh

Reference Information

CVE: CVE-2005-2798

BID: 14729