hecatae
resident hecatae
- Joined
- Feb 7, 2014
- Messages
- 769
- Reaction score
- 202
Anyone who has keyboard-interactive authentication enabled, please read.
According to all the reports, this vulnerability has been around since 2007.
Source:
[URL='https://kingcope.wordpress.com/']kingcopes´ blag[/url]
OpenSSH has a default value of six authentication tries before it will close the connection (the ssh client allows only three password entries per default).
With this vulnerability an attacker is able to request as many password prompts limited by the “login graced time” setting, that is set to two minutes by default.
FreeBSD systems are affected by the vulnerability because they have keyboard-interactive authentication enabled by default.
A simple way to exploit the bug is to execute this command:
This will effectively allow up to 10000 password entries limited by the login grace time setting.Code:ssh -lusername -oKbdInteractiveDevices=`perl -e 'print "pam," x 10000'` targethost
The crucial part is that if the attacker requests 10000 keyboard-interactive devices openssh will gracefully execute the request and will be inside a loop to accept passwords until the specified devices are exceeded.
According to all the reports, this vulnerability has been around since 2007.
Source:
[URL='https://kingcope.wordpress.com/']kingcopes´ blag[/url]