[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Security bypass vulnerability in Apache SSHD, PuTTY, WinSCP, SecureCRT, OpenSSH, FileZilla and Oracle Database Server - CVE-2023-48795

ID: oval:org.secpod.oval:def:96099Date: (C)2023-12-26   (M)2024-05-06
Class: VULNERABILITYFamily: windows




The host is installed with Apache SSHD through 2.11.0, PuTTY before 0.80, WinSCP before 6.2.2, SecureCRT before 9.4.3, FileZilla before 3.66.4, OpenSSH before 9.6, Oracle Database Server 19c, or 21c and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle issues in the SSH Binary Packet Protocol. Successful exploitation allows remote attackers to bypass integrity checks such that some packets are omitted, and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack.

Platform:
Microsoft Windows Server 2008
Microsoft Windows 7
Microsoft Windows 8.1
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2016
Microsoft Windows Server 2012 R2
Microsoft Windows Server
Microsoft Windows Server 2019
Microsoft Windows Server 2022
Microsoft Windows 10
Microsoft Windows 11
Product:
Apache SSHD
PuTTY
WinSCP
VanDyke Software SecureCRT
FileZilla
OpenSSH
Oracle Database Server
Reference:
CVE-2023-48795
CVE    1
CVE-2023-48795

© SecPod Technologies