[FREEBSD:13D83980-9F18-11EE-8E38-002590C1F29C] FreeBSD -- Prefix Truncation Attack in the SSH protocol

Severity Medium
Affected Packages 1
CVEs 1

Problem Description:
The SSH protocol executes an initial handshake between the
server and the client. This protocol handshake includes the
possibility of several extensions allowing different options to be
selected. Validation of the packets in the handshake is done through
sequence numbers.
Impact:
A man in the middle attacker can silently manipulate handshake
messages to truncate extension negotiation messages potentially
leading to less secure client authentication algorithms or deactivating
keystroke timing attack countermeasures.

Package Affected Version
pkg:freebsd/FreeBSD < 14.0_4
ID
FREEBSD:13D83980-9F18-11EE-8E38-002590C1F29C
Severity
medium
Severity from
CVE-2023-48795
URL
http://vuxml.freebsd.org/freebsd/13d83980-9f18-11ee-8e38-002590c1f29c.html
Published
2023-12-19T00:00:00
(9 months ago)
Modified
2024-01-02T00:00:00
(8 months ago)
Rights
FreeBSD VuXML Security Team
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:freebsd/FreeBSD FreeBSD < 14.0_4
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...