Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-14145

Опубликовано: 29 июн. 2020
Источник: debian
EPSS Низкий

Описание

The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
opensshunfixedpackage

Примечания

  • https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/

  • https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf

  • The OpenSSH project is not planning to change the behaviour of OpenSSH regarding

  • the issue, details in "3.1 OpenSSH" in the publication.

  • Partial mitigation: https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d (V_8_4_P1)

EPSS

Процентиль: 79%
0.01254
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 5 лет назад

The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.

CVSS3: 5.9
redhat
больше 5 лет назад

The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.

CVSS3: 5.9
nvd
больше 5 лет назад

The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.

CVSS3: 5.9
msrc
больше 5 лет назад

Описание отсутствует

suse-cvrf
около 5 лет назад

Security update for openssh

EPSS

Процентиль: 79%
0.01254
Низкий