OpenSSH < 7.5

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The SSH server running on the remote host is affected by an
information disclosure vulnerability.

Description :

According to its banner, the version of OpenSSH running on the remote
host is prior to 7.5. It is, therefore, affected by an information disclosure
vulnerability :

- An unspecified timing flaw exists in the CBC padding
oracle countermeasures, within the ssh and sshd
functions, that allows an unauthenticated, remote
attacker to disclose potentially sensitive information.
Note that the OpenSSH client disables CBC ciphers by
default. However, sshd offers them as lowest-preference
options, which will be removed by default in a future
release. (VulnDB 144000)

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.

See also :

http://www.openssh.com/txt/release-7.5

Solution :

Upgrade to OpenSSH version 7.5 or later.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Misc.

Nessus Plugin ID: 99359 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now