OpenSSH 7.x < 7.1 PermitRootLogin Security Bypass

low Nessus Plugin ID 85690

Synopsis

The SSH server running on the remote host is affected by a security bypass vulnerability.

Description

According to its banner, the version of OpenSSH running on the remote host is 7.x prior to 7.1. It is, therefore, affected by a security bypass vulnerability due to a logic error that is triggered under certain compile-time configurations when PermitRootLogin is set to 'prohibit-password' or 'without-password'. An unauthenticated, remote attacker can exploit this to permit password authentication to root while preventing other forms of authentication.

Solution

Upgrade to OpenSSH 7.1 or later.

See Also

http://www.openssh.com/txt/release-7.1

Plugin Details

Severity: Low

ID: 85690

File Name: openssh_71.nasl

Version: 1.6

Type: remote

Family: Misc.

Published: 8/28/2015

Updated: 3/27/2024

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Low

Base Score: 2.6

Temporal Score: 1.9

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:openbsd:openssh

Required KB Items: installed_sw/OpenSSH

Patch Publication Date: 8/21/2015

Vulnerability Publication Date: 8/21/2015