Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2008-5161
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-19 Nov, 2008 | 17:30
Updated At-11 Oct, 2018 | 20:54

Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.02.6LOW
AV:N/AC:H/Au:N/C:P/I:N/A:N
Type: Primary
Version: 2.0
Base score: 2.6
Base severity: LOW
Vector:
AV:N/AC:H/Au:N/C:P/I:N/A:N
CPE Matches

OpenBSD
openbsd
>>openssh>>4.7p1
cpe:2.3:a:openbsd:openssh:4.7p1:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.0
cpe:2.3:a:ssh:tectia_client:4.0:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.0.1
cpe:2.3:a:ssh:tectia_client:4.0.1:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.0.3
cpe:2.3:a:ssh:tectia_client:4.0.3:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.0.4
cpe:2.3:a:ssh:tectia_client:4.0.4:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.0.5
cpe:2.3:a:ssh:tectia_client:4.0.5:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.2
cpe:2.3:a:ssh:tectia_client:4.2:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.2.1
cpe:2.3:a:ssh:tectia_client:4.2.1:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.3
cpe:2.3:a:ssh:tectia_client:4.3:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.3.1
cpe:2.3:a:ssh:tectia_client:4.3.1:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.3.1j
cpe:2.3:a:ssh:tectia_client:4.3.1j:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.3.2
cpe:2.3:a:ssh:tectia_client:4.3.2:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.3.2j
cpe:2.3:a:ssh:tectia_client:4.3.2j:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.3.3
cpe:2.3:a:ssh:tectia_client:4.3.3:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.3.4
cpe:2.3:a:ssh:tectia_client:4.3.4:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.3.5
cpe:2.3:a:ssh:tectia_client:4.3.5:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.3.6
cpe:2.3:a:ssh:tectia_client:4.3.6:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.3.7
cpe:2.3:a:ssh:tectia_client:4.3.7:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.3.8k
cpe:2.3:a:ssh:tectia_client:4.3.8k:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.3.9k
cpe:2.3:a:ssh:tectia_client:4.3.9k:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.4
cpe:2.3:a:ssh:tectia_client:4.4:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.4.1
cpe:2.3:a:ssh:tectia_client:4.4.1:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.4.2
cpe:2.3:a:ssh:tectia_client:4.4.2:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.4.3
cpe:2.3:a:ssh:tectia_client:4.4.3:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.4.4
cpe:2.3:a:ssh:tectia_client:4.4.4:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.4.6
cpe:2.3:a:ssh:tectia_client:4.4.6:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.4.7
cpe:2.3:a:ssh:tectia_client:4.4.7:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.4.8
cpe:2.3:a:ssh:tectia_client:4.4.8:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.4.9
cpe:2.3:a:ssh:tectia_client:4.4.9:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.4.10
cpe:2.3:a:ssh:tectia_client:4.4.10:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>4.4.11
cpe:2.3:a:ssh:tectia_client:4.4.11:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>5.0.0
cpe:2.3:a:ssh:tectia_client:5.0.0:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>5.0.0f
cpe:2.3:a:ssh:tectia_client:5.0.0f:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>5.0.1
cpe:2.3:a:ssh:tectia_client:5.0.1:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>5.0.1f
cpe:2.3:a:ssh:tectia_client:5.0.1f:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>5.0.2
cpe:2.3:a:ssh:tectia_client:5.0.2:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>5.0.2f
cpe:2.3:a:ssh:tectia_client:5.0.2f:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>5.0.3
cpe:2.3:a:ssh:tectia_client:5.0.3:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>5.0.3f
cpe:2.3:a:ssh:tectia_client:5.0.3f:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>5.1.0
cpe:2.3:a:ssh:tectia_client:5.1.0:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>5.1.1
cpe:2.3:a:ssh:tectia_client:5.1.1:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>5.1.2
cpe:2.3:a:ssh:tectia_client:5.1.2:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>5.1.3
cpe:2.3:a:ssh:tectia_client:5.1.3:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>5.2.0
cpe:2.3:a:ssh:tectia_client:5.2.0:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>5.2.1
cpe:2.3:a:ssh:tectia_client:5.2.1:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>5.2.2
cpe:2.3:a:ssh:tectia_client:5.2.2:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>5.2.3
cpe:2.3:a:ssh:tectia_client:5.2.3:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>5.2.4
cpe:2.3:a:ssh:tectia_client:5.2.4:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>5.3.0
cpe:2.3:a:ssh:tectia_client:5.3.0:*:*:*:*:*:*:*
ssh
ssh
>>tectia_client>>5.3.1
cpe:2.3:a:ssh:tectia_client:5.3.1:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-200Primarynvd@nist.gov
CWE ID: CWE-200
Type: Primary
Source: nvd@nist.gov
Evaluator Description

http://securitytracker.com/alerts/2008/Nov/1021235.html CBC mode connections are affected
Evaluator Impact

Evaluator Solution

With a valid username and password patches are available at the following link: https://downloads.ssh.com/

Vendor Statements

Organization : Red Hat
Last Modified : 2009-09-02T00:00:00

This issue was addressed for Red Hat Enterprise Linux 5 by https://rhn.redhat.com/errata/RHSA-2009-1287.html After reviewing the upstream fix for this issue, Red Hat does not intend to address this flaw in Red Hat Enterprise Linux 3 or 4 at this time.

References
HyperlinkSourceResource
http://isc.sans.org/diary.html?storyid=5366cve@mitre.org
N/A
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705cve@mitre.org
N/A
http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.htmlcve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=125017764422557&w=2cve@mitre.org
N/A
http://openssh.org/txt/cbc.advcve@mitre.org
N/A
http://osvdb.org/49872cve@mitre.org
N/A
http://osvdb.org/50035cve@mitre.org
N/A
http://osvdb.org/50036cve@mitre.org
N/A
http://rhn.redhat.com/errata/RHSA-2009-1287.htmlcve@mitre.org
N/A
http://secunia.com/advisories/32740cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/32760cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/32833cve@mitre.org
N/A
http://secunia.com/advisories/33121cve@mitre.org
N/A
http://secunia.com/advisories/33308cve@mitre.org
N/A
http://secunia.com/advisories/34857cve@mitre.org
N/A
http://secunia.com/advisories/36558cve@mitre.org
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1cve@mitre.org
N/A
http://support.apple.com/kb/HT3937cve@mitre.org
N/A
http://support.attachmate.com/techdocs/2398.htmlcve@mitre.org
N/A
http://support.avaya.com/elmodocs2/security/ASA-2008-503.htmcve@mitre.org
N/A
http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txtcve@mitre.org
N/A
http://www.kb.cert.org/vuls/id/958563cve@mitre.org
US Government Resource
http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.htmlcve@mitre.org
N/A
http://www.securityfocus.com/archive/1/498558/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/archive/1/498579/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/bid/32319cve@mitre.org
N/A
http://www.securitytracker.com/id?1021235cve@mitre.org
N/A
http://www.securitytracker.com/id?1021236cve@mitre.org
N/A
http://www.securitytracker.com/id?1021382cve@mitre.org
N/A
http://www.ssh.com/company/news/article/953/cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2008/3172cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2008/3173cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2008/3409cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2009/1135cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2009/3184cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/46620cve@mitre.org
N/A
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667cve@mitre.org
N/A
https://kc.mcafee.com/corporate/index?page=content&id=SB10106cve@mitre.org
N/A
https://kc.mcafee.com/corporate/index?page=content&id=SB10163cve@mitre.org
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279cve@mitre.org
N/A
Hyperlink: http://isc.sans.org/diary.html?storyid=5366
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=125017764422557&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://openssh.org/txt/cbc.adv
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://osvdb.org/49872
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://osvdb.org/50035
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://osvdb.org/50036
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2009-1287.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/32740
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/32760
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/32833
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/33121
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/33308
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/34857
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/36558
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://support.apple.com/kb/HT3937
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://support.attachmate.com/techdocs/2398.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.kb.cert.org/vuls/id/958563
Source: cve@mitre.org
Resource:
US Government Resource
Hyperlink: http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/498558/100/0/threaded
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/498579/100/0/threaded
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/32319
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securitytracker.com/id?1021235
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securitytracker.com/id?1021236
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securitytracker.com/id?1021382
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.ssh.com/company/news/article/953/
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/3172
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/3173
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/3409
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2009/1135
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2009/3184
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/46620
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10106
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10163
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279
Source: cve@mitre.org
Resource: N/A
Change History
0Changes found

Details not found