Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-14145

Опубликовано: 29 июн. 2020
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.

A flaw was found in OpenSSH in versions 5.7 through 8.3, where an Observable Discrepancy occurs and leads to an information leak in the algorithm negotiation. This flaw allows a man-in-the-middle attacker to target initial connection attempts, where there is no host key for the server that has been cached by the client.

Отчет

This is a flaw in OpenSSH, which allows a man in the middle attack to determine, if a client already has prior knowledge of the remote hosts fingerprint. An attacker could use this information to ignore clients, which will show an error message during an man in the middle attack, while new clients can be intercepted without alerting them of the man in the middle attack. This essentially means that this flaw can help attacker's identify targets an MITM attack. However such a attack would still require the attacker to either have control over DNS or control over the network traffic. If the network is untrusted, Red Hat suggests the use ssh certificates for even more confidence and less human factor involved or gssapi key exchange, where kerberos is used to verify identity of the server.

Меры по смягчению последствий

Always connect to SSH servers with verified host keys to avoid any possibilities of man-in-the-middle attack.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5opensshOut of support scope
Red Hat Enterprise Linux 6opensshOut of support scope
Red Hat Enterprise Linux 7opensshWill not fix
Red Hat Enterprise Linux 8opensshFixedRHSA-2021:436809.11.2021
Red Hat Enterprise Linux 8opensshFixedRHSA-2021:436809.11.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-203
https://bugzilla.redhat.com/show_bug.cgi?id=1852930openssh: Observable discrepancy leading to an information leak in the algorithm negotiation

EPSS

Процентиль: 79%
0.01254
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 5 лет назад

The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.

CVSS3: 5.9
nvd
больше 5 лет назад

The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.

CVSS3: 5.9
msrc
больше 5 лет назад

Описание отсутствует

CVSS3: 5.9
debian
больше 5 лет назад

The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepan ...

suse-cvrf
около 5 лет назад

Security update for openssh

EPSS

Процентиль: 79%
0.01254
Низкий

5.9 Medium

CVSS3