search menu icon-carat-right cmu-wordmark

CERT Coordination Center

OpenSSH PAM challenge authentication failure

Vulnerability Note VU#602204

Original Release Date: 2003-09-23 | Last Revised: 2003-09-24

Overview

There is a vulnerability in the challenge authentication code of the Portable OpenSSH server when using the SSHv1 protocol and Pluggable Authentication Modules (PAM). This vulnerability could permit a remote attacker to log in to the system as any user, including potentially root, without using a password.

Description

There is a vulnerability in the challenge authentication code of the Portable OpenSSH server when using the SSHv1 protocol and Pluggable Authentication Modules (PAM). Versions 3.7p1 and 3.7.1p1 are affected. Note that the OpenBSD-specific releases are not affected by this issue.

Remote attackers could exploit servers configured with the following parameters:

    • OpenSSH 3.7.1p1 (portable)
    • Any platform
    • compiled with --with-pam
    • PrivilegeSeparation disabled
    • Protocol version 1 enabled (default)
    • ChallengeResponse enabled (default)

Note that this affects systems with password authentication disabled but challenge-response authentication still enabled. This does not to affect systems using SSHv2, but many systems are configured to fall back to SSHv1 if SSHv2 is not supported by the client.

Impact

A remote attacker could potentially log in to the system as any user, including root, using a null password. The root user can only be logged into if "PermitRootLogin" is enabled.

Solution

OpenSSH has announced version 3.7.1p2 to resolve this issue.

This issue can be mitigated by not using PAM. Set "UsePAM no" in sshd_config. To prevent root logins, Set "PermitRootLogin no".

Vendor Information

602204
 

View all 23 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Petri Heinonen and the OUSPG Team for reporting this vulnerability.

This document was written by Jason A Rafail.

Other Information

CVE IDs: CVE-2003-0786
Severity Metric: 6.58
Date Public: 2003-09-23
Date First Published: 2003-09-23
Date Last Updated: 2003-09-24 15:35 UTC
Document Revision: 23

Sponsored by CISA.