Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-36369

Опубликовано: 12 окт. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.5

Описание

An issue was discovered in Dropbear through 2020.81. Due to a non-RFC-compliant check of the available authentication methods in the client-side SSH code, it is possible for an SSH server to change the login process in its favor. This attack can bypass additional security measures such as FIDO2 tokens or SSH-Askpass. Thus, it allows an attacker to abuse a forwarded agent for logging on to another server unnoticed.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

released

2020.81-3+deb11u1
esm-apps/bionic

released

2017.75-3ubuntu0.1~esm1
esm-apps/focal

released

2019.78-2ubuntu0.1~esm1
esm-apps/jammy

released

2020.81-5ubuntu0.1
esm-apps/noble

released

2020.81-3+deb11u1
esm-apps/xenial

needed

focal

ignored

end of standard support, was needed
jammy

released

2020.81-5ubuntu0.1
kinetic

ignored

end of life, was needs-triage

Показывать по

EPSS

Процентиль: 34%
0.00141
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
больше 3 лет назад

An issue was discovered in Dropbear through 2020.81. Due to a non-RFC-compliant check of the available authentication methods in the client-side SSH code, it is possible for an SSH server to change the login process in its favor. This attack can bypass additional security measures such as FIDO2 tokens or SSH-Askpass. Thus, it allows an attacker to abuse a forwarded agent for logging on to another server unnoticed.

CVSS3: 7.5
debian
больше 3 лет назад

An issue was discovered in Dropbear through 2020.81. Due to a non-RFC- ...

CVSS3: 7.5
github
больше 3 лет назад

An issue was discovered in Dropbear through 2020.81. Due to a non-RFC-compliant check of the available authentication methods in the client-side SSH code, it is possible for an SSH server to change the login process in its favor. This attack can bypass additional security measures such as FIDO2 tokens or SSH-Askpass. Thus, it allows an attacker to abuse a forwarded agent for logging on to another server unnoticed.

CVSS3: 7.5
fstec
почти 4 года назад

Уязвимость компонента Non-RFC-compliant Check пакета программ для организации сеансов связи по протоколу SSH Dropbear, позволяющая нарушителю обойти существующие ограничения безопасности

EPSS

Процентиль: 34%
0.00141
Низкий

7.5 High

CVSS3