Korean
<< Back
VID 14207
Severity 30
Port 22
Protocol TCP
Class SSH
Detailed Description According to its banner, the version of OpenSSH running on the remote host is prior to 7.5. It is, therefore, affected by an information disclosure vulnerability :

- An unspecified timing flaw exists in the CBC padding oracle countermeasures, within the ssh and sshd functions, that allows an unauthenticated, remote attacker to disclose potentially sensitive information. Note that the OpenSSH client disables CBC ciphers by default. However, sshd offers them as lowest-preference options, which will be removed by default in a future release. (VulnDB 144000)

* References:

* Platforms Affected:
OpenSSH version before 7.5
Any operating system Any version
Recommendation Upgrade to the latest version of OpenSSH (7.5 or later), available from the OpenSSH Web site at http://www.openssh.org/
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)