Vulnerability from csaf_suse
Published
2015-10-19 16:07
Modified
2015-10-19 16:07
Summary
Security update for openssh
Notes
Title of the patch
Security update for openssh
Description of the patch
openssh was updated to fix four security issues.
These security issues were fixed:
- CVE-2015-5352: The x11_open_helper function in channels.c in ssh in OpenSSH when ForwardX11Trusted mode is not used, lacked a check of the refusal deadline for X connections, which made it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window (bsc#936695).
- CVE-2015-5600: The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH did not properly restrict the processing of keyboard-interactive devices within a single connection, which made it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list (bsc#938746).
- CVE-2015-4000: Removed and disabled weak DH groups (bsc#932483).
- Hardening patch to fix sftp RCE (bsc#903649).
These non-security issues were fixed:
- bsc#914309: sshd inherits oom_adj -17 on SIGHUP causing DoS potential for oom_killer.
- bsc#673532: limits.conf fsize change in SLES10SP3 causing problems to WebSphere mqm user.
Patchnames
slessp2-openssh-12168
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for openssh", title: "Title of the patch", }, { category: "description", text: "openssh was updated to fix four security issues.\n\nThese security issues were fixed:\n- CVE-2015-5352: The x11_open_helper function in channels.c in ssh in OpenSSH when ForwardX11Trusted mode is not used, lacked a check of the refusal deadline for X connections, which made it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window (bsc#936695).\n- CVE-2015-5600: The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH did not properly restrict the processing of keyboard-interactive devices within a single connection, which made it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list (bsc#938746).\n- CVE-2015-4000: Removed and disabled weak DH groups (bsc#932483).\n- Hardening patch to fix sftp RCE (bsc#903649).\n\nThese non-security issues were fixed:\n- bsc#914309: sshd inherits oom_adj -17 on SIGHUP causing DoS potential for oom_killer.\n- bsc#673532: limits.conf fsize change in SLES10SP3 causing problems to WebSphere mqm user.\n ", title: "Description of the patch", }, { category: "details", text: "slessp2-openssh-12168", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1840-1.json", }, { category: "self", summary: "URL for SUSE-SU-2015:1840-1", url: "https://www.suse.com/support/update/announcement/2015/suse-su-20151840-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2015:1840-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2015-October/001650.html", }, { category: "self", summary: "SUSE Bug 673532", url: "https://bugzilla.suse.com/673532", }, { category: "self", summary: "SUSE Bug 903649", url: "https://bugzilla.suse.com/903649", }, { category: "self", summary: "SUSE Bug 905118", url: "https://bugzilla.suse.com/905118", }, { category: "self", summary: "SUSE Bug 914309", url: "https://bugzilla.suse.com/914309", }, { category: "self", summary: "SUSE Bug 932483", url: "https://bugzilla.suse.com/932483", }, { category: "self", summary: "SUSE Bug 936695", url: "https://bugzilla.suse.com/936695", }, { category: "self", summary: "SUSE Bug 938746", url: "https://bugzilla.suse.com/938746", }, { category: "self", summary: "SUSE CVE CVE-2015-4000 page", url: "https://www.suse.com/security/cve/CVE-2015-4000/", }, { category: "self", summary: "SUSE CVE CVE-2015-5352 page", url: "https://www.suse.com/security/cve/CVE-2015-5352/", }, { category: "self", summary: "SUSE CVE CVE-2015-5600 page", url: "https://www.suse.com/security/cve/CVE-2015-5600/", }, ], title: "Security update for openssh", tracking: { current_release_date: "2015-10-19T16:07:14Z", generator: { date: "2015-10-19T16:07:14Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2015:1840-1", initial_release_date: "2015-10-19T16:07:14Z", revision_history: [ { date: "2015-10-19T16:07:14Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "openssh-5.1p1-41.69.1.i586", product: { name: "openssh-5.1p1-41.69.1.i586", product_id: "openssh-5.1p1-41.69.1.i586", }, }, { category: "product_version", name: "openssh-askpass-5.1p1-41.69.1.i586", product: { name: "openssh-askpass-5.1p1-41.69.1.i586", product_id: "openssh-askpass-5.1p1-41.69.1.i586", }, }, { category: "product_version", name: "openssh-askpass-gnome-5.1p1-41.69.4.i586", product: { name: "openssh-askpass-gnome-5.1p1-41.69.4.i586", product_id: "openssh-askpass-gnome-5.1p1-41.69.4.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "openssh-5.1p1-41.69.1.s390x", product: { name: "openssh-5.1p1-41.69.1.s390x", product_id: "openssh-5.1p1-41.69.1.s390x", }, }, { category: "product_version", name: "openssh-askpass-5.1p1-41.69.1.s390x", product: { name: "openssh-askpass-5.1p1-41.69.1.s390x", product_id: "openssh-askpass-5.1p1-41.69.1.s390x", }, }, { category: "product_version", name: "openssh-askpass-gnome-5.1p1-41.69.4.s390x", product: { name: "openssh-askpass-gnome-5.1p1-41.69.4.s390x", product_id: "openssh-askpass-gnome-5.1p1-41.69.4.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "openssh-5.1p1-41.69.1.x86_64", product: { name: "openssh-5.1p1-41.69.1.x86_64", product_id: "openssh-5.1p1-41.69.1.x86_64", }, }, { category: "product_version", name: "openssh-askpass-5.1p1-41.69.1.x86_64", product: { name: "openssh-askpass-5.1p1-41.69.1.x86_64", product_id: "openssh-askpass-5.1p1-41.69.1.x86_64", }, }, { category: "product_version", name: "openssh-askpass-gnome-5.1p1-41.69.4.x86_64", product: { name: "openssh-askpass-gnome-5.1p1-41.69.4.x86_64", product_id: "openssh-askpass-gnome-5.1p1-41.69.4.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:suse_sles_ltss:11:sp2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "openssh-5.1p1-41.69.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.i586", }, product_reference: "openssh-5.1p1-41.69.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "openssh-5.1p1-41.69.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.s390x", }, product_reference: "openssh-5.1p1-41.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "openssh-5.1p1-41.69.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.x86_64", }, product_reference: "openssh-5.1p1-41.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "openssh-askpass-5.1p1-41.69.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.i586", }, product_reference: "openssh-askpass-5.1p1-41.69.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "openssh-askpass-5.1p1-41.69.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.s390x", }, product_reference: "openssh-askpass-5.1p1-41.69.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "openssh-askpass-5.1p1-41.69.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.x86_64", }, product_reference: "openssh-askpass-5.1p1-41.69.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "openssh-askpass-gnome-5.1p1-41.69.4.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.i586", }, product_reference: "openssh-askpass-gnome-5.1p1-41.69.4.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "openssh-askpass-gnome-5.1p1-41.69.4.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.s390x", }, product_reference: "openssh-askpass-gnome-5.1p1-41.69.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "openssh-askpass-gnome-5.1p1-41.69.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.x86_64", }, product_reference: "openssh-askpass-gnome-5.1p1-41.69.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP2-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2015-4000", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-4000", }, ], notes: [ { category: "general", text: "The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the \"Logjam\" issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-4000", url: "https://www.suse.com/security/cve/CVE-2015-4000", }, { category: "external", summary: "SUSE Bug 1074631 for CVE-2015-4000", url: "https://bugzilla.suse.com/1074631", }, { category: "external", summary: "SUSE Bug 1211968 for CVE-2015-4000", url: "https://bugzilla.suse.com/1211968", }, { category: "external", summary: "SUSE Bug 931600 for CVE-2015-4000", url: "https://bugzilla.suse.com/931600", }, { category: "external", summary: "SUSE Bug 931698 for CVE-2015-4000", url: "https://bugzilla.suse.com/931698", }, { category: "external", summary: "SUSE Bug 931723 for CVE-2015-4000", url: "https://bugzilla.suse.com/931723", }, { category: "external", summary: "SUSE Bug 931845 for CVE-2015-4000", url: "https://bugzilla.suse.com/931845", }, { category: "external", summary: "SUSE Bug 932026 for CVE-2015-4000", url: "https://bugzilla.suse.com/932026", }, { category: "external", summary: "SUSE Bug 932483 for CVE-2015-4000", url: "https://bugzilla.suse.com/932483", }, { category: "external", summary: "SUSE Bug 934789 for CVE-2015-4000", url: "https://bugzilla.suse.com/934789", }, { category: "external", summary: "SUSE Bug 935033 for CVE-2015-4000", url: "https://bugzilla.suse.com/935033", }, { category: "external", summary: "SUSE Bug 935540 for CVE-2015-4000", url: "https://bugzilla.suse.com/935540", }, { category: "external", summary: "SUSE Bug 935979 for CVE-2015-4000", url: "https://bugzilla.suse.com/935979", }, { category: "external", summary: "SUSE Bug 937202 for CVE-2015-4000", url: "https://bugzilla.suse.com/937202", }, { category: "external", summary: "SUSE Bug 937766 for CVE-2015-4000", url: "https://bugzilla.suse.com/937766", }, { category: "external", summary: "SUSE Bug 938248 for CVE-2015-4000", url: "https://bugzilla.suse.com/938248", }, { category: "external", summary: "SUSE Bug 938432 for CVE-2015-4000", url: "https://bugzilla.suse.com/938432", }, { category: "external", summary: "SUSE Bug 938895 for CVE-2015-4000", url: "https://bugzilla.suse.com/938895", }, { category: "external", summary: "SUSE Bug 938905 for CVE-2015-4000", url: "https://bugzilla.suse.com/938905", }, { category: "external", summary: "SUSE Bug 938906 for CVE-2015-4000", url: "https://bugzilla.suse.com/938906", }, { category: "external", summary: "SUSE Bug 938913 for CVE-2015-4000", url: "https://bugzilla.suse.com/938913", }, { category: "external", summary: "SUSE Bug 938945 for CVE-2015-4000", url: "https://bugzilla.suse.com/938945", }, { category: "external", summary: "SUSE Bug 943664 for CVE-2015-4000", url: "https://bugzilla.suse.com/943664", }, { category: "external", summary: "SUSE Bug 944729 for CVE-2015-4000", url: "https://bugzilla.suse.com/944729", }, { category: "external", summary: "SUSE Bug 945582 for CVE-2015-4000", url: "https://bugzilla.suse.com/945582", }, { category: "external", summary: "SUSE Bug 955589 for CVE-2015-4000", url: "https://bugzilla.suse.com/955589", }, { category: "external", summary: "SUSE Bug 980406 for CVE-2015-4000", url: "https://bugzilla.suse.com/980406", }, { category: "external", summary: "SUSE Bug 990592 for CVE-2015-4000", url: "https://bugzilla.suse.com/990592", }, { category: "external", summary: "SUSE Bug 994144 for CVE-2015-4000", url: "https://bugzilla.suse.com/994144", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2015-10-19T16:07:14Z", details: "important", }, ], title: "CVE-2015-4000", }, { cve: "CVE-2015-5352", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-5352", }, ], notes: [ { category: "general", text: "The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-5352", url: "https://www.suse.com/security/cve/CVE-2015-5352", }, { category: "external", summary: "SUSE Bug 1074631 for CVE-2015-5352", url: "https://bugzilla.suse.com/1074631", }, { category: "external", summary: "SUSE Bug 1138392 for CVE-2015-5352", url: "https://bugzilla.suse.com/1138392", }, { category: "external", summary: "SUSE Bug 936695 for CVE-2015-5352", url: "https://bugzilla.suse.com/936695", }, { category: "external", summary: "SUSE Bug 938277 for CVE-2015-5352", url: "https://bugzilla.suse.com/938277", }, { category: "external", summary: "SUSE Bug 948086 for CVE-2015-5352", url: "https://bugzilla.suse.com/948086", }, { category: "external", summary: "SUSE Bug 992991 for CVE-2015-5352", url: "https://bugzilla.suse.com/992991", }, { category: "external", summary: "SUSE Bug 996040 for CVE-2015-5352", url: "https://bugzilla.suse.com/996040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2015-10-19T16:07:14Z", details: "moderate", }, ], title: "CVE-2015-5352", }, { cve: "CVE-2015-5600", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-5600", }, ], notes: [ { category: "general", text: "The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-5600", url: "https://www.suse.com/security/cve/CVE-2015-5600", }, { category: "external", summary: "SUSE Bug 1009988 for CVE-2015-5600", url: "https://bugzilla.suse.com/1009988", }, { category: "external", summary: "SUSE Bug 1074631 for CVE-2015-5600", url: "https://bugzilla.suse.com/1074631", }, { category: "external", summary: "SUSE Bug 1138392 for CVE-2015-5600", url: "https://bugzilla.suse.com/1138392", }, { category: "external", summary: "SUSE Bug 938746 for CVE-2015-5600", url: "https://bugzilla.suse.com/938746", }, { category: "external", summary: "SUSE Bug 943006 for CVE-2015-5600", url: "https://bugzilla.suse.com/943006", }, { category: "external", summary: "SUSE Bug 943007 for CVE-2015-5600", url: "https://bugzilla.suse.com/943007", }, { category: "external", summary: "SUSE Bug 943010 for CVE-2015-5600", url: "https://bugzilla.suse.com/943010", }, { category: "external", summary: "SUSE Bug 943504 for CVE-2015-5600", url: "https://bugzilla.suse.com/943504", }, { category: "external", summary: "SUSE Bug 945985 for CVE-2015-5600", url: "https://bugzilla.suse.com/945985", }, { category: "external", summary: "SUSE Bug 948086 for CVE-2015-5600", url: "https://bugzilla.suse.com/948086", }, { category: "external", summary: "SUSE Bug 954457 for CVE-2015-5600", url: "https://bugzilla.suse.com/954457", }, { category: "external", summary: "SUSE Bug 957883 for CVE-2015-5600", url: "https://bugzilla.suse.com/957883", }, { category: "external", summary: "SUSE Bug 996040 for CVE-2015-5600", url: "https://bugzilla.suse.com/996040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-5.1p1-41.69.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:openssh-askpass-gnome-5.1p1-41.69.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2015-10-19T16:07:14Z", details: "important", }, ], title: "CVE-2015-5600", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.