Описание
OpenSSH 9.5 through 9.7 before 9.8 sometimes allows timing attacks against echo-off password entry (e.g., for su and Sudo) because of an ObscureKeystrokeTiming logic error. Similarly, other timing attacks against keystroke entry could occur.
A flaw was found in OpenSSH. A logic error in the SSH ObscureKeystrokeTiming feature (on by default) rendered this feature ineffective. A passive observer could still detect which network packets contained real keystrokes when the countermeasure was active because fake and real keystroke packets were being sent unconditionally.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 10 | openssh | Fix deferred | ||
Red Hat Enterprise Linux 6 | openssh | Not affected | ||
Red Hat Enterprise Linux 7 | openssh | Not affected | ||
Red Hat Enterprise Linux 8 | openssh | Not affected | ||
Red Hat Enterprise Linux 9 | openssh | Not affected | ||
Red Hat OpenShift Container Platform 4 | rhcos | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
3.1 Low
CVSS3
Связанные уязвимости
OpenSSH 9.5 through 9.7 before 9.8 sometimes allows timing attacks against echo-off password entry (e.g., for su and Sudo) because of an ObscureKeystrokeTiming logic error. Similarly, other timing attacks against keystroke entry could occur.
OpenSSH 9.5 through 9.7 before 9.8 sometimes allows timing attacks against echo-off password entry (e.g., for su and Sudo) because of an ObscureKeystrokeTiming logic error. Similarly, other timing attacks against keystroke entry could occur.
OpenSSH 9.5 through 9.7 before 9.8 sometimes allows timing attacks aga ...
EPSS
3.1 Low
CVSS3