CVE Vulnerabilities

CVE-2012-5975

Improper Authentication

Published: Dec 04, 2012 | Modified: Dec 05, 2012
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
9.3 HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu

The SSH USERAUTH CHANGE REQUEST feature in SSH Tectia Server 6.0.4 through 6.0.20, 6.1.0 through 6.1.12, 6.2.0 through 6.2.5, and 6.3.0 through 6.3.2 on UNIX and Linux, when old-style password authentication is enabled, allows remote attackers to bypass authentication via a crafted session involving entry of blank passwords, as demonstrated by a root login session from a modified OpenSSH client with an added input_userauth_passwd_changereq call in sshconnect2.c.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

Name Vendor Start Version End Version
Tectia_server Ssh 6.0.4 (including) 6.0.4 (including)
Tectia_server Ssh 6.0.5 (including) 6.0.5 (including)
Tectia_server Ssh 6.0.6 (including) 6.0.6 (including)
Tectia_server Ssh 6.0.7 (including) 6.0.7 (including)
Tectia_server Ssh 6.0.8 (including) 6.0.8 (including)
Tectia_server Ssh 6.0.9 (including) 6.0.9 (including)
Tectia_server Ssh 6.0.10 (including) 6.0.10 (including)
Tectia_server Ssh 6.0.11 (including) 6.0.11 (including)
Tectia_server Ssh 6.0.12 (including) 6.0.12 (including)
Tectia_server Ssh 6.0.13 (including) 6.0.13 (including)
Tectia_server Ssh 6.0.14 (including) 6.0.14 (including)
Tectia_server Ssh 6.0.17 (including) 6.0.17 (including)
Tectia_server Ssh 6.0.18 (including) 6.0.18 (including)
Tectia_server Ssh 6.0.19 (including) 6.0.19 (including)
Tectia_server Ssh 6.0.20. (including) 6.0.20. (including)
Tectia_server Ssh 6.1.0 (including) 6.1.0 (including)
Tectia_server Ssh 6.1.1 (including) 6.1.1 (including)
Tectia_server Ssh 6.1.2 (including) 6.1.2 (including)
Tectia_server Ssh 6.1.3 (including) 6.1.3 (including)
Tectia_server Ssh 6.1.4 (including) 6.1.4 (including)
Tectia_server Ssh 6.1.5 (including) 6.1.5 (including)
Tectia_server Ssh 6.1.6 (including) 6.1.6 (including)
Tectia_server Ssh 6.1.7 (including) 6.1.7 (including)
Tectia_server Ssh 6.1.8 (including) 6.1.8 (including)
Tectia_server Ssh 6.1.9 (including) 6.1.9 (including)
Tectia_server Ssh 6.1.12 (including) 6.1.12 (including)
Tectia_server Ssh 6.2.0 (including) 6.2.0 (including)
Tectia_server Ssh 6.2.1 (including) 6.2.1 (including)
Tectia_server Ssh 6.2.2 (including) 6.2.2 (including)
Tectia_server Ssh 6.2.3 (including) 6.2.3 (including)
Tectia_server Ssh 6.2.4 (including) 6.2.4 (including)
Tectia_server Ssh 6.2.5 (including) 6.2.5 (including)
Tectia_server Ssh 6.3.0 (including) 6.3.0 (including)
Tectia_server Ssh 6.3.1 (including) 6.3.1 (including)
Tectia_server Ssh 6.3.2 (including) 6.3.2 (including)

Potential Mitigations

References