ALERT OpenSSH keyboard-interactive authentication brute force vulnerability

hecatae

resident hecatae
Joined
Feb 7, 2014
Messages
769
Reaction score
202
Anyone who has keyboard-interactive authentication enabled, please read.

OpenSSH has a default value of six authentication tries before it will close the connection (the ssh client allows only three password entries per default).
With this vulnerability an attacker is able to request as many password prompts limited by the “login graced time” setting, that is set to two minutes by default.
FreeBSD systems are affected by the vulnerability because they have keyboard-interactive authentication enabled by default.
A simple way to exploit the bug is to execute this command:
Code:
ssh -lusername -oKbdInteractiveDevices=`perl -e 'print "pam," x 10000'` targethost
This will effectively allow up to 10000 password entries limited by the login grace time setting.
The crucial part is that if the attacker requests 10000 keyboard-interactive devices openssh will gracefully execute the request and will be inside a loop to accept passwords until the specified devices are exceeded.

According to all the reports, this vulnerability has been around since 2007.

Source:
[URL='https://kingcope.wordpress.com/']kingcopes´ blag
[/url]
 

Members online

Forum statistics

Threads
25,821
Messages
167,803
Members
19,247
Latest member
abuhyder
Get 3CX - Absolutely Free!

Link up your team and customers Phone System Live Chat Video Conferencing

Hosted or Self-managed. Up to 10 users free forever. No credit card. Try risk free.

3CX
A 3CX Account with that email already exists. You will be redirected to the Customer Portal to sign in or reset your password if you've forgotten it.
Top