what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

SshdJJFen.txt

SshdJJFen.txt
Posted Aug 17, 1999
Authored by J.J.F. / Hackers Team

(english) Security vulnerability in sshd2 <= 2.0.11 allows remote attacker to make repeated brute force attempts on the login/passwd without being logged. Fixed in sshd2 >= 2.0.12.

tags | exploit, remote
SHA-256 | db162d27acdda51744563dec6172c820f16099310d31eb4b1f8a84bb22de5e16

SshdJJFen.txt

Change Mirror Download


- J.J.F. / Hackers Team - Security Advisory
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Date: 05/09/1999
Release: 05/14/1999
Author: Zhodiac <zhodiac@jjf.org>
URL: http://www.jjf.org
Application: sshd2 up to 2.0.11
OS: Unix
Risk: Risky :), long term could gain system access.

-=-=-=-=-=-=-=-=
Introduction
-=-=-=-=-=-=-=-=

In the default instalation of sshd2 (up to 2.0.11) there is an
open way to bruteforce a login/password, without any kind of ip logging
by the sshd. Version 2.0.12 and newers seems to be not vulnerable to
this attack, because it logs the ip at connection time.

-=-=-=-=-=-=-=-=
Details
-=-=-=-=-=-=-=-=

When a ssh client connects to the daemon, it has a number
(default is three) of attempts to guess the correct password before
disconnecting. If we shutdown the connection before using up the number
of attempts, the daemon will not log neither the connection, the
password guesses nor the ip of the client.

One cristal clear example:

[zhodiac@piscis zhodiac]$ ssh -l zhodiac piscis
zhodiac's password:
zhodiac's password:
zhodiac's password:

Disconnected; authentication error.
[zhodiac@piscis zhodiac]$

In /var/log/messages:

May 9 12:42:53 piscis sshd2[1391]: User authentication failed:
'Authentication method disabled. (user 'zhodiac', client address
'192.168.1.1:1344', requested service 'ssh-connection')'

Now we try the bug:

[zhodiac@piscis zhodiac]$ ssh -l zhodiac piscis
zhodiac's password:
zhodiac's password:
zhodiac's password: FATAL: Received signal 2.
[zhodiac@piscis zhodiac]$ ssh -l zhodiac piscis
zhodiac's password:
zhodiac's password:
zhodiac's password: FATAL: Received signal 2.
[zhodiac@piscis zhodiac]$ ssh -l zhodiac piscis
zhodiac's password:
zhodiac's password:
zhodiac's password: FATAL: Received signal 2.
[zhodiac@piscis zhodiac]$

Those "FATAL: Received signal2." are the response of
interrupting the program with a ^C.

Lets see what syslog did:

May 9 12:44:41 piscis sshd2[1403]: Remote host disconnected: Connection
closed.
May 9 12:44:44 piscis sshd2[1405]: Remote host disconnected: Connection
closed.
May 9 12:44:47 piscis sshd2[1407]: Remote host disconnected: Connection
closed.

No ip, no password guesses attempts on the logs!
So a bruteforce can be done without any kind of logging... Sorry
script-kiddies, no program available!

-=-=-=-=-=-=-=-=
Quick Fix
-=-=-=-=-=-=-=-=

Edit the file sshd2_config (usually at /etc/ssh2), set the value
of "PasswordGuesses" to 1. With this each time a password is tried it
will log it in the following way:

May 9 12:46:07 piscis sshd[1308]: User authentication failed:
'Authentication method disabled. (user 'zhodiac', client address
'192.168.1.1:1527', requested service 'ssh-connection')'

It is also recommended to set the value of "ListenAddress" so we
will have more control of which ips can use our ssh service.

A better solution is to upgrade to 2.0.12 version or newer , with
them at connection it will log via syslog in the following way:

May 9 15:23:33 piscis sshd2[7184]: connection from "192.168.1.1"

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
zhodiac@jjf.org

http://www.jjf.org
- J.J.F. / Hackers Team - Security Advisory
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close