Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain a shell remotely >> F-Secure SSH Password Authentication Policy Evasion


Vulnerability Assessment Details

F-Secure SSH Password Authentication Policy Evasion

Vulnerability Assessment Summary
F-Secure SSH version

Detailed Explanation for this Vulnerability Assessment

The remote host is running F-Secure SSH.

This version contains a bug which may permit a user to log in
using a password even though the server policy dispermits it.

A possible hacker may exploit this flaw to set up a dictionary attack against the
remote SSH server and eventually get access to this host.

Solution : Upgrade to F-Secure SSH 3.1.0 build 9 or newer
Network Security Threat Level: Low

Networks Security ID: 9824

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

1974 Electronic Calculators by Altair 8800's Ed Roberts MITS 1440 HP-35 Wang 700
$42.0
1974 Electronic Calculators by Altair 8800's Ed Roberts MITS 1440 HP-35 Wang 700 pictureAltair 8800 Manual 1975 Bill Gates / Paul Allen - ships worldwide
$299.99
Altair 8800 Manual 1975 Bill Gates / Paul Allen - ships worldwide pictureIMSAI 8080A MPU-A CPU parts kit not Altair MITS
$54.95
IMSAI 8080A MPU-A CPU parts kit not Altair MITS pictureComputer Photo History IBM 360 ENIAC Apple 1 UNIVAC PDP-8/F JOHNNIAC Altair 8800
$46.0
Computer Photo History IBM 360 ENIAC Apple 1 UNIVAC PDP-8/F JOHNNIAC Altair 8800 picture


Discussions

No Discussions have been posted on this vulnerability.