A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key.
For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
Attack Parameters
Impact Assessment
CVSS Vector v3.1
Weakness Type (CWE)
Vulnerable Products 10
| Configuration | From (including) | Up to (excluding) |
|---|---|---|
|
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
|
6.9
|
<= 9.8
|
|
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:6.8:p1:*:*:*:*:*:*
|
— | — |
|
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:9.9:-:*:*:*:*:*:*
|
— | — |
|
Openbsd Openssh
cpe:2.3:a:openbsd:openssh:9.9:p1:*:*:*:*:*:*
|
— | — |
|
Netapp Active_Iq_Unified_Manager
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
|
— | — |
|
Netapp Ontap
cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*
|
— | — |
|
Redhat Openshift_Container_Platform
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
|
— | — |
|
Debian Debian_Linux
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
|
— | — |
|
Debian Debian_Linux
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
|
— | — |
|
Redhat Enterprise_Linux
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
|
— | — |