Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 555518 (CVE-2015-5600)

Summary: <net-misc/openssh-7.1_p1-r2: MaxAuthTries bypass attack Vulnerability (CVE-2015-5600)
Product: Gentoo Security Reporter: Andrew Savchenko <bircoph>
Component: Default ConfigsAssignee: Gentoo Security <security>
Severity: normal CC: base-system, info, kfm, mjo
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard: A3 [glsa cve]
Package list:
Runtime testing required: ---
Bug Depends on: 571892    
Bug Blocks:    
Attachments: openssl-6_9p1_kbd-interactive.diff

Description Andrew Savchenko gentoo-dev 2015-07-20 22:31:02 UTC

any version of openssh with default config is vulnerable to MaxAuthTries bypass attack[1]. Exploit is available at [1] as well.

Default options (from man sshd_config are):
ChallengeResponseAuthentication    yes
KbdInteractiveAuthentication       yes
UsePAM                             no

Please note, that in order to use exploit UsePAM should be set to "yes", but this is not the only way to exploit reported vulnerability.

IMO vulnerability is not severe, as it may hurt only weak passwords. Anyway it should be taken with care and handled somehow.

Comment 1 kfm 2015-07-24 23:17:07 UTC
Assigned as CVE-2015-5600.

There is some useful commentary in Red Hat's bug tracker:

As pointed out there, the principal issue is with keyboard-interactive authentication, as facilitated by ChallengeResponseAuthentication being enabled. While PAM based authentication is also impacted upon, it is to a lesser extent due to the pam_unix module enforcing its own delay.

Here is the upstream patch:
Comment 2 kfm 2015-07-24 23:36:14 UTC
Created attachment 407558 [details, diff]

Patch to prevent the server from co-operating with a client specifying an arbitrarily large number of KbdInteractiveDevices.
Comment 3 kfm 2015-07-24 23:47:02 UTC
See also the posts by mancha and cve-assign here:
Comment 4 Torbjörn Lönnemark 2015-07-25 18:59:17 UTC
This discussion on openbsd-misc may also be of interest:
Comment 5 SpanKY gentoo-dev 2015-08-12 08:09:47 UTC
it's in the tree now, but lacks USE=X509 support.  upstream is usually pretty fast there so we can wait a little bit (should anyways to let it bake a bit).
Comment 6 Yury German Gentoo Infrastructure gentoo-dev 2015-11-03 14:23:54 UTC
Over two months now, is that enough backing? Are we ready to go stable.
Comment 7 SpanKY gentoo-dev 2015-11-03 16:01:54 UTC
openssh-7.1_p1-r2 should be fine to go stable now
Comment 8 Agostino Sarubbo gentoo-dev 2015-11-03 17:12:56 UTC
amd64 stable
Comment 9 Agostino Sarubbo gentoo-dev 2015-11-03 17:14:06 UTC
x86 stable
Comment 10 Agostino Sarubbo gentoo-dev 2015-11-04 14:27:39 UTC
ppc stable
Comment 11 Agostino Sarubbo gentoo-dev 2015-11-05 11:00:24 UTC
sparc stable
Comment 12 Markus Meier gentoo-dev 2015-11-05 20:57:25 UTC
arm stable
Comment 13 Jeroen Roovers (RETIRED) gentoo-dev 2015-11-06 04:21:49 UTC
Stable for HPPA PPC64.
Comment 14 Benny Pedersen 2015-11-09 21:50:32 UTC
root logins is not working with this one here, with default configs, in 6.9 it was possible to login with root and default, so here i think 7.1 have incompatible changes

what are considered stable in this ebuild as now ?
Comment 15 Kristian Fiskerstrand (RETIRED) gentoo-dev 2015-11-09 22:02:51 UTC
(In reply to Benny Pedersen from comment #14)
> root logins is not working with this one here, with default configs, in 6.9
> it was possible to login with root and default, so here i think 7.1 have
> incompatible changes
> what are considered stable in this ebuild as now ?

Please file a separate bug for issues not related to this security bug report (although that might be related to )
Comment 16 Michael Orlitzky gentoo-dev 2015-11-10 01:31:06 UTC
Benny's comment is referring to the new default for PermitRootLogin. From the 7.0 release notes:

  * The default for the sshd_config(5) PermitRootLogin option has
    changed from "yes" to "prohibit-password".

For stable users (server operators, at least) there's a good chance they're going to lose remote access. Guess how I got looking for this bug? =)
Comment 17 SpanKY gentoo-dev 2015-11-10 04:42:09 UTC
(In reply to Michael Orlitzky from comment #16)

odd, the default config has long implied it was set to "no", not "yes".  but clearly the commented config doesn't match the code.  i'll update the log in the ebuild to note this.
Comment 19 Matt Turner gentoo-dev 2015-11-15 18:28:06 UTC
alpha stable

(last arch)
Comment 20 Kristian Fiskerstrand (RETIRED) gentoo-dev 2015-11-15 18:33:20 UTC
(In reply to Matt Turner from comment #19)
> alpha stable
> (last arch)

Thank you arches, 

@maintainers: please cleanup vulnerable versions

New GLSA request filed
Comment 21 Yury German Gentoo Infrastructure gentoo-dev 2015-11-28 16:53:54 UTC
Maintainer(s), please drop the vulnerable version(s).
Comment 22 GLSAMaker/CVETool Bot gentoo-dev 2015-12-21 14:23:39 UTC
This issue was resolved and addressed in
 GLSA 201512-04 at
by GLSA coordinator Yury German (BlueKnight).
Comment 23 Yury German Gentoo Infrastructure gentoo-dev 2015-12-21 14:25:10 UTC
Re-Opening for cleanup.
Maintainer(s), please drop the vulnerable version(s).
Comment 24 Yury German Gentoo Infrastructure gentoo-dev 2016-01-26 02:26:35 UTC
Setting dependency to Bug #571892 for cleanup.
Comment 25 Aaron Bauman (RETIRED) gentoo-dev 2016-06-12 00:38:07 UTC
Cleanup complete.