Greetings,
First of all, forgive me if I'm not in the right FreeBSD forum. Feel free to redirect me to the proper channel.
I have this vulnerability on one of my production web servers which is failing a PCI compliance test. I've been searching and reading but haven't found a solution yet. I'm running FreeBSD 11.3-RELEASE-p2 with the latest version of OpenSSH 7.9.
Running ssh towards my server yields:
$ ssh -V
OpenSSH_7.9p1, LibreSSL 2.7.3
Running netcat on my sever yields:
$ echo "Hello" | nc localhost 59
SSH-2.0-OpenSSH_7.5 FreeBSD-20170903
Protocol mismatch.
I provide no banner path but I still get the above mismatch. It is this message that is making my tests to fail. Could you please help me to fix this?
************************************************************************************************
THREAT:
OpenSSH (OpenBSD Secure Shell) is a set of computer programs providing encrypted communication sessions over a computer network using the SSH protocol.
A username enumeration vulnerability exists in OpenSSH, that a remote attacker could leverage to enumerate valid users on a targeted system. The attacker could try to enumerate users by transmitting malicious packets. Due to the vulnerability, if a username does not exist, then the server sends a SSH2_MSG_USERAUTH_FAILURE message to the attacker. If the username exists, then the server sends a SSH2_MSG_SERVICE_ACCEPT before calling fatal() and closes the connection.
Affected Versions:
OpenSSH through 7.7
QID Detection Logic:
Authenticated: Vulnerable OpenSSH versions are detected by running ssh -V command.
Unauthenticated: Vulnerable OpenSSH versions are detected from the banner exposed.
IMPACT:
Successful exploitation allows an attacker to enumerate usernames on a targeted system.
SOLUTION:
Customers are advised to upgrade to OpenSSH 7.8 or later versions to remediate this vulnerability.
Patch:
Following are links for downloading patches to fix the vulnerabilities:
OpenSSH 7.8 or later
RESULT:
Vulnerable SSH-2.0-OpenSSH_7.5 FreeBSD-20170903 detected on port 59 over TCP.
************************************************************************************************
Thank you,
First of all, forgive me if I'm not in the right FreeBSD forum. Feel free to redirect me to the proper channel.
I have this vulnerability on one of my production web servers which is failing a PCI compliance test. I've been searching and reading but haven't found a solution yet. I'm running FreeBSD 11.3-RELEASE-p2 with the latest version of OpenSSH 7.9.
Running ssh towards my server yields:
$ ssh -V
OpenSSH_7.9p1, LibreSSL 2.7.3
Running netcat on my sever yields:
$ echo "Hello" | nc localhost 59
SSH-2.0-OpenSSH_7.5 FreeBSD-20170903
Protocol mismatch.
I provide no banner path but I still get the above mismatch. It is this message that is making my tests to fail. Could you please help me to fix this?
************************************************************************************************
THREAT:
OpenSSH (OpenBSD Secure Shell) is a set of computer programs providing encrypted communication sessions over a computer network using the SSH protocol.
A username enumeration vulnerability exists in OpenSSH, that a remote attacker could leverage to enumerate valid users on a targeted system. The attacker could try to enumerate users by transmitting malicious packets. Due to the vulnerability, if a username does not exist, then the server sends a SSH2_MSG_USERAUTH_FAILURE message to the attacker. If the username exists, then the server sends a SSH2_MSG_SERVICE_ACCEPT before calling fatal() and closes the connection.
Affected Versions:
OpenSSH through 7.7
QID Detection Logic:
Authenticated: Vulnerable OpenSSH versions are detected by running ssh -V command.
Unauthenticated: Vulnerable OpenSSH versions are detected from the banner exposed.
IMPACT:
Successful exploitation allows an attacker to enumerate usernames on a targeted system.
SOLUTION:
Customers are advised to upgrade to OpenSSH 7.8 or later versions to remediate this vulnerability.
Patch:
Following are links for downloading patches to fix the vulnerabilities:
OpenSSH 7.8 or later
RESULT:
Vulnerable SSH-2.0-OpenSSH_7.5 FreeBSD-20170903 detected on port 59 over TCP.
************************************************************************************************
Thank you,