Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-36369

Опубликовано: 12 окт. 2022
Источник: debian
EPSS Низкий

Описание

An issue was discovered in Dropbear through 2020.81. Due to a non-RFC-compliant check of the available authentication methods in the client-side SSH code, it is possible for an SSH server to change the login process in its favor. This attack can bypass additional security measures such as FIDO2 tokens or SSH-Askpass. Thus, it allows an attacker to abuse a forwarded agent for logging on to another server unnoticed.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dropbearfixed2022.82-1package
dropbearfixed2020.81-3+deb11u1bullseyepackage

Примечания

  • https://github.com/mkj/dropbear/pull/128

  • https://github.com/mkj/dropbear/commit/210a9833496ed2a93b8da93924874938127ce0b5 (DROPBEAR_2022.82)

EPSS

Процентиль: 34%
0.00141
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 3 лет назад

An issue was discovered in Dropbear through 2020.81. Due to a non-RFC-compliant check of the available authentication methods in the client-side SSH code, it is possible for an SSH server to change the login process in its favor. This attack can bypass additional security measures such as FIDO2 tokens or SSH-Askpass. Thus, it allows an attacker to abuse a forwarded agent for logging on to another server unnoticed.

CVSS3: 7.5
nvd
больше 3 лет назад

An issue was discovered in Dropbear through 2020.81. Due to a non-RFC-compliant check of the available authentication methods in the client-side SSH code, it is possible for an SSH server to change the login process in its favor. This attack can bypass additional security measures such as FIDO2 tokens or SSH-Askpass. Thus, it allows an attacker to abuse a forwarded agent for logging on to another server unnoticed.

CVSS3: 7.5
github
больше 3 лет назад

An issue was discovered in Dropbear through 2020.81. Due to a non-RFC-compliant check of the available authentication methods in the client-side SSH code, it is possible for an SSH server to change the login process in its favor. This attack can bypass additional security measures such as FIDO2 tokens or SSH-Askpass. Thus, it allows an attacker to abuse a forwarded agent for logging on to another server unnoticed.

CVSS3: 7.5
fstec
почти 4 года назад

Уязвимость компонента Non-RFC-compliant Check пакета программ для организации сеансов связи по протоколу SSH Dropbear, позволяющая нарушителю обойти существующие ограничения безопасности

EPSS

Процентиль: 34%
0.00141
Низкий