Security bypass vulnerability in Apache SSHD, PuTTY, WinSCP, SecureCRT, OpenSSH, FileZilla and Oracle Database Server - CVE-2023-48795ID: oval:org.secpod.oval:def:96099 | Date: (C)2023-12-26 (M)2024-05-06 |
Class: VULNERABILITY | Family: windows |
The host is installed with Apache SSHD through 2.11.0, PuTTY before 0.80, WinSCP before 6.2.2, SecureCRT before 9.4.3, FileZilla before 3.66.4, OpenSSH before 9.6, Oracle Database Server 19c, or 21c and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle issues in the SSH Binary Packet Protocol. Successful exploitation allows remote attackers to bypass integrity checks such that some packets are omitted, and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack.
Platform: |
Microsoft Windows Server 2008 |
Microsoft Windows 7 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2016 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows Server |
Microsoft Windows Server 2019 |
Microsoft Windows Server 2022 |
Microsoft Windows 10 |
Microsoft Windows 11 |
Product: |
Apache SSHD |
PuTTY |
WinSCP |
VanDyke Software SecureCRT |
FileZilla |
OpenSSH |
Oracle Database Server |