CVE-2010-4478

Updated: 2024-11-24 03:22:36.283487

Description:

OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x HIGH 7.5
CVSS Version 3.x 0

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

CentOS 6 ELS openssh 5.3p1 0.0 Not Vulnerable 2022-04-26 04:03:30