CVE-2010-4478
Publication date 6 December 2010
Last updated 24 July 2024
Ubuntu priority
OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
Status
Package | Ubuntu Release | Status |
---|---|---|
openssh | 10.10 maverick |
Not affected
|
10.04 LTS lucid |
Not affected
|
|
9.10 karmic |
Not affected
|
|
8.04 LTS hardy |
Not affected
|
|
6.06 LTS dapper |
Not affected
|
Notes
sbeattie
openssh in karmic and prior does not include J-PAKE auth support; in lucid and maverick it’s present but not enabled at compile time. Added a QRT regression test that looks for client-side support.
Patch details
Package | Patch details |
---|---|
openssh |