Korean
<< Back
VID 14008
Severity 20
Port 22
Protocol TCP
Class Ssh
Detailed Description The version of the SSH Server contains an AllowedAuthentications configuration overriding vulnerability.
Secure Shell is the commercial SSH implementation distributed and maintained by SSH Communications. It is available for the Unix, Linux, and Microsoft Windows platforms. The older versions than 3.1.2 and newer or equal to 3.0.0 of SSH contains a vulnerability that may, under some circumstances, allow remote users to authenticate using a password whereas it is not explicitely listed as a valid authentication mechanism. This could allow a user to authenticate using a different or weaker means, such as a password. In such a situation where stronger authentication protocols are in place, and system user accounts have been secured with weak passwords, an attacker may be able to gain access to the system using the weak password, rather than the strong authentcation scheme. An attacker may use this flaw to attempt to a brute force attack using dictionary files.
Recommendation 1. A workaround is to use "RequiredAuthentications" keyword instead of "AllowedAuthentications" in sshd2_config:
RequiredAuthentications
hostbased, publickey

2. Upgrade to version 3.1.2 of SSH which solves this problem:

SSH Communications Security Upgrade ssh-3.1.2.tar.gz
ftp://ftp.ssh.com/pub/ssh/ssh-3.1.2.tar.gz
Related URL CVE-2002-1646 (CVE)
Related URL 4810 (SecurityFocus)
Related URL 9163 (ISS)