2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2005-2666" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2005-08-23T04:00:00.000" ,
2023-11-07 21:03:21 +00:00
"lastModified" : "2023-11-07T01:57:40.687" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "SSH, as implemented in OpenSSH before 4.0 and possibly other implementations, stores hostnames, IP addresses, and keys in plaintext in the known_hosts file, which makes it easier for an attacker that has compromised an SSH user's account to generate a list of additional targets that are more likely to have the same password or key."
}
] ,
"vendorComments" : [
{
"organization" : "Red Hat" ,
"comment" : "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162681\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttp://www.redhat.com/security/updates/classification/\n" ,
"lastModified" : "2006-09-20T00:00:00"
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:H/Au:N/C:P/I:N/A:N" ,
"accessVector" : "LOCAL" ,
"accessComplexity" : "HIGH" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 1.2
} ,
"baseSeverity" : "LOW" ,
"exploitabilityScore" : 1.9 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-255"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "580008AC-2667-4708-8F7E-D70416A460EE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E05D8E86-EC01-4589-B372-4DEB7845C81F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "764AD252-CA2F-4A87-BCAA-7747E8C410E0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CFFAA075-4277-4FD8-8A5A-867EEE1BA2F4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "269BB9F7-55E5-4CB3-8429-C37C7132799F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C6E6F639-31A0-4026-B6D4-51BA79FB1D20"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0211BCE3-0DED-40BA-8A21-1A97B91F71C7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B4EE9E4B-CABC-4EA2-9075-CC23CEB1B0A3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5AD7BB30-AC79-4153-852C-1053DCF4DE53"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9E188C66-C8F1-4C13-AAFF-7C83B2A884B8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9039BE91-AF0A-41E7-8F9F-15375890E120"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "08BCB2EA-DF9D-4853-805B-29FA6274E2B7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0F93417F-2498-4576-9F5D-B59F77D39669"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AF3AB42C-B614-4746-99AD-E94140D91BF3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "458167E5-9BC2-40BE-AC8A-9761A4F19494"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3FB9B4C7-4235-4388-8E5D-E72ECCC37A7E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "86ACA0ED-A3D0-48A7-B06F-13709AD23B55"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0FEB9262-D05E-4610-9C79-3EDE44AC7C0B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8176879B-1875-4AC9-B15A-2ABCFCD04F88"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FAA26A12-F96A-4025-BBCA-72B7A3B1E60C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A02751E9-2D38-4495-9572-8D84D71D4773"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7A36BEA2-DAE4-423C-8D85-0F6036351F98"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "80DC64F6-FE28-44BA-91D1-EC2DB11B2CFC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "44CCF5CD-B434-4392-A79A-C1945D2AE30A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AEB456B8-9D8B-4985-858D-6A43FA5EE2E9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2BD4E0F6-4EEA-4EC7-83E7-FC6F7D2E7A3C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C35F4ABE-1B0C-4195-8F99-BF993A17882B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ADC7352D-2916-47F7-A256-F897D763DC9B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AEC3FC36-B246-4DCB-8984-228525D9A356"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BC861000-37D8-4B0F-BFA0-57E9BE125B56"
}
]
}
]
}
] ,
"references" : [
{
"url" : "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.11/SCOSA-2006.11.txt" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://nms.csail.mit.edu/projects/ssh/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "http://secunia.com/advisories/19243" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/25098" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.eweek.com/article2/0%2C1759%2C1815795%2C00.asp" ,
2023-04-24 12:24:31 +02:00
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0257.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10201" ,
"source" : "cve@mitre.org"
}
]
}