Bugzilla – Bug 660128
VUL-1: CVE-2010-4478: openssh: when J-PAKE is enabled, does not properly validate the
Last modified: 2016-06-01 08:23:13 UTC
Hi. There is a security bug in package 'openssh'. This bug is public. There is no coordinated release date (CRD) set. CVE number: CVE-2010-4478 CVE description: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4478 CVSS v2 Base Score: 7.5 (important) (AV:N/AC:L/Au:N/C:P/I:P/A:P) Authentication Issues (CWE-287) Original posting: public parameters CVE-ID: CVE-2010-4478 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4478 OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-YYYY-NNN. Current Votes: None (candidate not yet proposed)
It may not affect us because we might not support J-PAKE. Please verify...
JPAKE is not defined so the vulnerable code from jpake.c is not compiled in ie we are not affected
It seems, that JPAKE depends (at least partly) on BSD user capabilities (and hence won't build as-is GNU/Linux)
Huawei is requesting patch for CVE-2010-4478 on sles10 sp2
@zhigang gao: JPAKE was never built into our openssh versions.
(In reply to Marcus Meissner from comment #7) > @zhigang gao: JPAKE was never built into our openssh versions. Thanks very much!