Upstream information

CVE-2010-4478 at MITRE

Description

OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.5
Vector AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Note from the SUSE Security Team

Our openssh packages are build without J-PAKE support, so we are not affected by this problem.

SUSE Bugzilla entry: 660128 [RESOLVED / UPSTREAM]

No SUSE Security Announcements cross referenced.


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
Carwos 1 openssh Analysis
HPE Helion OpenStack 8 openssh Analysis
SUSE CaaS Platform 4.0 openssh Analysis
SUSE Enterprise Storage 6 openssh Analysis
SUSE Linux Enterprise High Performance Computing 12 SP5 openssh Analysis
SUSE Linux Enterprise High Performance Computing 15 LTSS openssh Analysis
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS openssh Analysis
SUSE Linux Enterprise Module for Basesystem 15 SP2 openssh Analysis
SUSE Linux Enterprise Module for Server Applications 15 SP2 openssh Analysis
SUSE Linux Enterprise Point of Service 11 SP3 openssh Analysis
SUSE Linux Enterprise Server 11 SP4 LTSS openssh Analysis
SUSE Linux Enterprise Server 12 SP2 BCL openssh Analysis
SUSE Linux Enterprise Server 12 SP2 LTSS ERICSSON openssh Analysis
SUSE Linux Enterprise Server 12 SP2 LTSS SAP openssh Analysis
SUSE Linux Enterprise Server 12 SP3 BCL openssh Analysis
SUSE Linux Enterprise Server 12 SP3 ESPOS openssh Analysis
SUSE Linux Enterprise Server 12 SP3 LTSS openssh Analysis
SUSE Linux Enterprise Server 12 SP4 ESPOS openssh Analysis
SUSE Linux Enterprise Server 12 SP4 LTSS openssh Analysis
SUSE Linux Enterprise Server 12 SP5 openssh Analysis
SUSE Linux Enterprise Server 15 LTSS openssh Analysis
SUSE Linux Enterprise Server 15 SP1 Business Critical Linux openssh Analysis
SUSE Linux Enterprise Server 15 SP1 LTSS openssh Analysis
SUSE Linux Enterprise Server ESPOS 15 openssh Analysis
SUSE Linux Enterprise Server for SAP Applications 12 SP3 openssh Analysis
SUSE Linux Enterprise Server for SAP Applications 12 SP4 openssh Analysis
SUSE Linux Enterprise Server for SAP Applications 12 SP5 openssh Analysis
SUSE Linux Enterprise Server for SAP Applications 15 openssh Analysis
SUSE Linux Enterprise Server for SAP Applications 15 SP1 openssh Analysis
SUSE Manager Proxy 4.0 openssh Unsupported
SUSE Manager Retail Branch Server 4.0 openssh Unsupported
SUSE Manager Server 4.0 openssh Unsupported
SUSE OpenStack Cloud 8 openssh Analysis
SUSE OpenStack Cloud 9 openssh Analysis
SUSE OpenStack Cloud Crowbar 8 openssh Analysis
SUSE OpenStack Cloud Crowbar 9 openssh Analysis