search menu icon-carat-right cmu-wordmark

CERT Coordination Center

SSH Tectia Server contains a race condition when the password change plugin is enabled

Vulnerability Note VU#814198

Original Release Date: 2004-03-23 | Last Revised: 2004-03-23

Overview

SSH Tectia Server contains a race condition that may permit an authenticated user access to the private key of the server. Exploitation of this vulnerability may lead to the ability to compromise the trust relationships of the vulnerable server.

Description

SSH Tectia Server versions 4.0.3 and 4.0.4 for Unix contain a race condition vulnerability when the password change plugin (ssh-passwd-plugin) is enabled. Note that the password change plugin is disabled by default. Versions 4.0.3 and 4.0.4 of SSH Tectia Server running on the following platforms are affected:

    • Redhat Linux 7.3, 8.0, 9.0 - Intel i686
    • IBM AIX 4.3, 5.1, 5.2 Power PC - RS/6000
    • Sun Solaris 2.5.1, 2.6, 7, 8, 9 - SPARC
    • HP/Compaq HP-UX 10.20, 11.0, 11.11 (11i) - PA-RISC
If a host has been running a vulnerable version of SSH Tectia, configured to use the password change plugin and the users have had shell access, SSH recommends that the hostkeys be regenerated after upgrading.

Impact

Exploitation of this vulnerability may lead to the ability of an authenticated user with shell access to gain access to the private key of the server, thus compromising the trust relationships of the vulnerable server.

Solution

Upgrading to 4.0.5. If a host has been running a vulnerable version of SSH Tectia, configured to use the password change plugin and the users have had shell access, SSH recommends that the hostkeys be regenerated after upgrading.

Disabling the AuthPassword.ChangePlugin configuration option will mitigate this vulnerability.

Vendor Information

814198
 

SSH Communications Security Affected

Updated:  March 23, 2004

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see http://www.ssh.com/company/newsroom/article/520/

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to SSH Communications for reporting this vulnerability.

This document was written by Jason A Rafail and is based on the information provided by SSH Communications.

Other Information

CVE IDs: None
Severity Metric: 11.39
Date Public: 2003-03-23
Date First Published: 2004-03-23
Date Last Updated: 2004-03-23 15:38 UTC
Document Revision: 18

Sponsored by CISA.