Race Condition Affecting openssh package, versions <1:3.8.1p1-8.sarge.4
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-OPENSSH-517499
- published 31 Dec 2003
- disclosed 31 Dec 2003
Introduced: 31 Dec 2003
CVE-2003-1562 Open this link in a new tabHow to fix?
Upgrade Debian:11
openssh
to version 1:3.8.1p1-8.sarge.4 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssh
package and not the openssh
package as distributed by Debian
.
See How to fix?
for Debian:11
relevant fixed versions and status.
sshd in OpenSSH 3.6.1p2 and earlier, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, which makes it easier for remote attackers to use timing differences to determine if the password step of a multi-step authentication is successful, a different vulnerability than CVE-2003-0190.
References
- https://security-tracker.debian.org/tracker/CVE-2003-1562
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=248747
- http://www.securityfocus.com/archive/1/320153
- http://www.securityfocus.com/archive/1/320302
- http://www.securityfocus.com/archive/1/320440
- http://www.securityfocus.com/bid/7482
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf