Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-5600

EPSS 73.59% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2015-5600

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
OpenSSH sshd 权限许可和访问控制问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OpenSSH(OpenBSD Secure Shell)是OpenBSD计划组所维护的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 6.9及之前版本的sshd中的auth2-chall.c文件中的‘kbdint_next_device’函数存在安全漏洞,该漏洞源于程序没有正确限制处理单链接中的keyboard-interactive设备。远程攻击者可借助ssh -oKbdInteractive
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2015-5600

#POC DescriptionSource LinkShenlong Link
1Professional cybersecurity assessment demonstrating vulnerability identification, CVSS severity scoring, MITRE ATT&CK framework application, and detailed remediation planning for OpenSSH 6.6.1p1 critical vulnerabilities (CVE-2016-0777, CVE-2015-5600)https://github.com/Abdirisaq-ali-aynab/openssh-vulnerability-assessmentPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2015-5600

登录查看更多情报信息。

Same Patch Batch · n/a · 2015-08-03 · 18 CVEs total

CVE-2015-1958IBM MQ Light 资源管理错误漏洞
CVE-2015-4936IBM WebSphere eXtreme Scale 拒绝服务漏洞
CVE-2015-4935IBM Tivoli Storage Manager FastBack 基于栈的缓冲区溢出漏洞
CVE-2015-4934IBM Tivoli Storage Manager FastBack 基于栈的缓冲区溢出漏洞
CVE-2015-4933IBM Tivoli Storage Manager FastBack 基于栈的缓冲区溢出漏洞
CVE-2015-4932IBM Tivoli Storage Manager FastBack 基于栈的缓冲区溢出漏洞
CVE-2015-4931IBM Tivoli Storage Manager FastBack 基于栈的缓冲区溢出漏洞
CVE-2015-1987IBM MQ Light 资源管理错误漏洞
CVE-2015-1970IBM WebSphere DataPower XC10 信息泄露漏洞
CVE-2015-5352OpenSSH‘x11_open_helper()’函数权限许可和访问控制问题漏洞
CVE-2015-1956IBM MQ Light 资源管理错误漏洞
CVE-2015-1955IBM MQ Light 资源管理错误漏洞
CVE-2015-5623WordPress 安全漏洞
CVE-2015-5622WordPress 跨站脚本漏洞
CVE-2015-3440WordPress 跨站脚本漏洞
CVE-2015-5537Siemens RuggedCom ROS和ROX II设备信息泄露漏洞
CVE-2015-5084Siemens SIMATIC WinCC Sm@rtClient和SIMATIC WinCC Sm@rtClient Lite 信息泄露漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2015-5600

No comments yet


Leave a comment