Vulnerability Name:

CVE-2008-3844 (CCN-44747)

Assigned:2008-08-22
Published:2008-08-22
Updated:2017-08-08
Summary:Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact.
Note: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-20
Vulnerability Consequences:Other
References:Source: MITRE
Type: CNA
CVE-2008-3844

Source: CCN
Type: RHSA-2008-0855
Critical: openssh security update

Source: SECUNIA
Type: Permissions Required, Third Party Advisory
31575

Source: CCN
Type: SA32241
Avaya Products Red Hat Tampered OpenSSH Packages

Source: SECUNIA
Type: Permissions Required, Third Party Advisory
32241

Source: CCN
Type: SECTRACK ID: 1020730
OpenSSH for Red Hat Enterprise Linux Packages May Have Been Compromised

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1020730

Source: CONFIRM
Type: Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm

Source: CCN
Type: OpenSSH Web site
OpenSSH

Source: CCN
Type: OSVDB ID: 47635
OpenSSH Packages on Red Hat Enterprise Linux Compromised Distribution

Source: CCN
Type: fedora-announce-list Mailing List, Fri, 22 Aug 2008 08:00:02 -0400
Infrastructure report, 2008-08-22 UTC 1200

Source: CCN
Type: Red Hat Security Updates, 22nd August 2008
OpenSSH blacklist script

Source: CONFIRM
Type: Third Party Advisory
http://www.redhat.com/security/data/openssh-blacklist.html

Source: REDHAT
Type: Not Applicable
RHSA-2008:0855

Source: BID
Type: Third Party Advisory, VDB Entry
30794

Source: CCN
Type: BID-30794
Red Hat OpenSSH Backdoor Vulnerability

Source: VUPEN
Type: Broken Link
ADV-2008-2821

Source: CCN
Type: White Wolf Security #080826-1
Kyocera Mita Scanner File Utility (Multiple)

Source: XF
Type: UNKNOWN
rhel-openssh-backdoor(44747)

Source: XF
Type: UNKNOWN
openssh-rhel-backdoor(44747)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:redhat:enterprise_linux:4.5.z:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.5.z:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:4:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:5:*:client:*:*:*:*:*
  • AND
  • cpe:/a:openbsd:openssh:*:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:openbsd:openssh:*:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.5.z::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.5.z::es:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:29192
    P
    RHSA-2008:0855 -- openssh security update (Critical)
    2015-08-17
    oval:org.mitre.oval:def:21987
    P
    ELSA-2008:0855: openssh security update (Critical)
    2014-05-26
    oval:com.redhat.rhsa:def:20080855
    P
    RHSA-2008:0855: openssh security update (Critical)
    2008-08-22
    BACK
    redhat enterprise linux 4.5.z
    redhat enterprise linux 4.5.z
    redhat enterprise linux 5.0
    redhat enterprise linux desktop 4
    redhat enterprise linux desktop 5
    openbsd openssh *
    openbsd openssh *
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 5
    redhat enterprise linux 5
    redhat enterprise linux 4.5.z
    redhat enterprise linux 4.5.z