Ask the Community
Groups
CVE-2015-5600: openssh: MaxAuthTries limit bypass - Connect IT Community | Kaseya
<main> <article class="userContent"> <h3 data-id="cve-id"><strong>CVE ID</strong></h3> <p>CVE-2015-5600</p> <h3 data-id="description"><strong>DESCRIPTION</strong></h3> <p>It was discovered that the OpenSSH sshd daemon did not check the list of keyboard-interactive authentication methods for duplicates. A remote attacker could use this flaw to bypass the MaxAuthTries limit, making it easier to perform password guessing attacks.<br><br><br> </p> <h3 data-id="resolution"><strong>RESOLUTION</strong></h3> <p>Unitrends Risk Assessment: None with security updates 4/26/17 or later<br><br>Resolution:<br>Not vulnerable if “ChallengeResponseAuthentication no” in sshd_config.<br>Fixed in openssh-5.3p1-114.el6 and later. </p> <h3 data-id="link-to-advisories"><strong>LINK TO ADVISORIES</strong></h3> <p></p> <ul><li><a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2015-5600%250D%250Ahttps%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2FCVE-2015-5600">https://nvd.nist.gov/vuln/detail/CVE-2015-5600 https://access.redhat.com/security/cve/CVE-2015-5600</a></li></ul> </article> </main>