VID |
14102 |
Severity |
20 |
Port |
22 |
Protocol |
TCP |
Class |
SSH |
Detailed Description |
According to its banner, the version of OpenSSH running on the remote host is prior to version 7.1. It is, therefore, affected by a security bypass vulnerability due to a logic error that is triggered under certain compile-time configurations when PermitRootLogin is set to 'prohibit-password' or 'without-password'. An unauthenticated, remote attacker can exploit this to permit password authentication to root while preventing other forms of authentication.
* Note: This check solely relied on the banner of the remote SSH server to assess this vulnerability, so this might be a false positive.
* References: http://www.openssh.com/txt/release-7.1
* Platforms Affected: OpenSSH version before 7.1 Any operating system Any version |
Recommendation |
Upgrade to the latest version of OpenSSH (7.1 or later), available from the OpenSSH Web site at http://www.openssh.org/ |
Related URL |
(CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|