| CVE-ID |
CVE-2010-4478
|
• Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings
|
| Description |
| OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly
validate the public parameters in the J-PAKE protocol, which allows
remote attackers to bypass the need for knowledge of the shared
secret, and successfully authenticate, by sending crafted values in
each round of the protocol, a related issue to CVE-2010-4252.
|
| References |
|
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
|
|
|
| Assigning CNA |
| N/A |
| Date Entry Created |
| 20101206 |
Disclaimer: The entry creation date may reflect when
the CVE-ID was allocated or reserved, and does not
necessarily indicate when this vulnerability was
discovered, shared with the affected vendor, publicly
disclosed, or updated in CVE.
|
| Phase (Legacy) |
| Assigned (20101206) |
| Votes (Legacy) |
|
| Comments (Legacy) |
|
| Proposed (Legacy) |
| N/A |
|
This is an entry on the CVE
list, which standardizes names for security
problems. |
|
|
|
For More Information: cve@mitre.org
|