Vulnerability Name: | CVE-2003-1120 (CCN-15585) | ||||||||
Assigned: | 2003-12-31 | ||||||||
Published: | 2003-12-31 | ||||||||
Updated: | 2017-07-11 | ||||||||
Summary: | Race condition in SSH Tectia Server 4.0.3 and 4.0.4 for Unix, when the password change plugin (ssh-passwd-plugin) is enabled, allows local users to obtain the server's private key. | ||||||||
CVSS v3 Severity: | 4.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 3.7 Low (CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Obtain Information | ||||||||
References: | Source: MITRE Type: CNA CVE-2003-1120 Source: CCN Type: SA11193 SSH Tectia Server ssh-passwd-plugin Private Host Key Exposure Source: SECUNIA Type: UNKNOWN 11193 Source: SECTRACK Type: UNKNOWN 1009532 Source: CCN Type: SECTRACK ID: 1009532 SSH Tectia Server May Disclose Private Key to Remote Users Source: CCN Type: US-CERT VU#814198 SSH Tectia Server contains a race condition when the password change plugin is enabled Source: CERT-VN Type: Patch, Third Party Advisory, US Government Resource VU#814198 Source: OSVDB Type: UNKNOWN 4491 Source: CCN Type: OSVDB ID: 44909 PHP GENERATE_SEED Macro Seed Prediction Weakness Random Functions Based Protection Bypass Source: CCN Type: OSVDB ID: 4491 PHP GENERATE_SEED Macro Seed Prediction Weakness Random Functions Based Protection Bypass Source: BID Type: Patch 9956 Source: CCN Type: BID-9956 SSH Communications SSH Tectia Server Private Key Disclosure Vulnerability Source: CONFIRM Type: Patch http://www.ssh.com/company/newsroom/article/520/ Source: CCN Type: SSH Communications Security Web site SSH : Support : Downloads : SSH Tectia Server (Unix) Source: XF Type: UNKNOWN sshtectiaserver-passwdplugin-race-condition(15585) Source: XF Type: UNKNOWN sshtectiaserver-passwdplugin-race-condition(15585) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |