MGASA-2015-0295

Source
https://advisories.mageia.org/MGASA-2015-0295.html
Import Source
https://advisories.mageia.org/MGASA-2015-0295.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0295
Related
Published
2015-07-28T21:01:59Z
Modified
2015-07-28T20:49:37Z
Summary
Updated openssh package fixes security vulnerability
Details

The OpenSSH server, when keyboard-interactive challenge response authentication is enabled and PAM is being used (the default configuration in Mageia), can be tricked into allowing more password attempts than the MaxAuthTries setting would normally allow in one connection, which can aid an attacker in brute-force password guessing (CVE-2015-5600).

References
Credits

Affected packages

Mageia:4 / openssh

Package

Name
openssh
Purl
pkg:rpm/mageia/openssh?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.2p2-3.4.mga4

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / openssh

Package

Name
openssh
Purl
pkg:rpm/mageia/openssh?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6p1-5.3.mga5

Ecosystem specific

{
    "section": "core"
}