SSH.com Communications SSH Tectia Authentication Bypass Remote Exploit (0day)
|| CVE: 2012-5975
||Vulnerable App: N/A
SSH Tectia Remote Authentication Bypass
Tectia is the commercial OpenSSH solution. The product can be found at:
An attacker in the possession of a valid username of an SSH Tectia installation running on UNIX (verified: AIX/Linux) can login without a password.
The bug is in the SSH USERAUTH CHANGE REQUEST routines which are there to allow a user to change their password. A bug in this code allows an attacker to login without a password by forcing a password change request prior to authentication.
The vulnerability has been verified on UNIX operating systems and at least on this (recent) versions:
• SSH-2.0-220.127.116.11 SSH Tectia Server (Latest available version from www.tectia.com)
• SSH-2.0-18.104.22.168 SSH Tectia Server
A default installation on Linux (version 22.214.171.124 of Tectia) is vulnerable to the attack.