SSH: OpenSSH kbdint_next_device Policy Bypass

This signature detects attempts to exploit a code execution vulnerability in OpenSSH A successful attack can lead to policy bypass.

Extended Description

The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.

Affected Products

Openbsd openssh

References

CVE: CVE-2015-5600

Short Name
SSH:KBDINT-NEXT-DEV-POL-BYPASS
Severity
Minor
Recommended
True
Recommended Action
Drop
Category
SSH
Keywords
Bypass CVE-2015-5600 OpenSSH Policy kbdint_next_device
Release Date
02/08/2016
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3337
False Positive
Unknown
Vendors

Openbsd

CVSS Score

8.5

Found a potential security threat?