Korean
<< Back
VID 14031
Severity 40
Port 22
Protocol TCP
Class SSH
Detailed Description The SSH server, according to its banner, is vulnerable to multiple flaws.
Multiple vendors' implementations of the secure shell (SSH) transport layer protocol contain vulnerabilities that could allow a remote attacker to execute arbitrary code with the privileges of the SSH process or cause a denial of service. The vulnerabilities affect SSH clients and servers, and they occur before user authentication takes place. On Microsoft Windows systems, SSH servers commonly run with SYSTEM privileges, and on UNIX systems, SSH daemons typically run with root privileges.

Common Vulnerabilities and Exposures (CVE) has assigned the following candidate numbers for several classes of tests performed by SSHredder:

1. incorrect field lengths
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1357
2. lists with empty elements or multiple separators
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1358
3. "classic" buffer overflows
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1359
4. null characters in strings
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1360

* Note: This check item solely relied on the version of the remote SSH server to assess this vulnerability, so this might be a false positive.

* References:
http://www.cert.org/advisories/CA-2002-36.html
http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0110.html

* Platforms Affected:
F-Secure Corp. SSH servers and clients for UNIX - v3.1.0 (build 11) and earlier
F-Secure Corp. SSH for Windows - v5.2 and earlier
SSH Communications Security, Inc. SSH for Windows - v3.2.2 and earlier
SSH Communications Security, Inc. SSH for UNIX - v3.2.2 and earlier
FiSSH SSH client for Windows - v1.0A and earlier
InterSoft Int'l, Inc. SecureNetTerm client for Windows - v5.4.1 and earlier
NetComposite ShellGuard SSH client for Windows - v3.4.6 and earlier
Pragma Systems, Inc. SecureShell SSH server for Windows - v2 and earlier
PuTTY SSH client for Windows - v0.53 and earlier (v0.53b not affected)
WinSCP SCP client for Windows - v2.0.0 and earlier
Recommendation Apply the appropriate patch or upgrade for your system, as listed in the following site:
http://www.cert.org/advisories/CA-2002-36.html

-- OR --

As workarounds, limit access to SSH servers to trusted hosts and networks using firewalls or other packet-filtering systems. Some SSH servers may have the ability to restrict access based on IP addresses, or similar effects may be achieved by using TCP wrappers or other related technology.
Related URL CVE-2002-1357 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)