Bug 141642
Summary: | SSH allows attacker to divine root password | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 3 | Reporter: | George Toft <george> |
Component: | openssh | Assignee: | Tomas Mraz <tmraz> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | medium | ||
Version: | 3.0 | CC: | bressers, deisenst, mjc |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | i386 | ||
OS: | Linux | ||
Whiteboard: | impact=low,public=20041130 | ||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2005-05-18 13:48:34 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
George Toft
2004-12-02 17:52:00 UTC
This issue affects RHEL3 and RHEL2.1. Back-envelope estimates seem to show that with a 3 second delay between trials a dictionary attack of the sort desribed will get to perform, in optimal conditions, something between 2500 and 3000 probes per 24 hours. If an attack with such rate against any password, not mentioning the one for root, has realistic chances to succeed then the system in question has much more serious problems to worry about. Not that this is not a hole but just to keep things in a proportion. A fix for this minor issue will be included in RHSA-2005:106 scheduled for inclusion in Update 5. An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2005-106.html |