Secure Shell Password Brute Force Vulnerability

A vulnerability in the SSH2 server up to and including version 2.0.11 allows remote attackers to brute force logins and passwords without the attempts being logged.

When a SSH client cconnect to the server, it has a number (default of three) of attempts to enter the correct password before it is disconnected. If the connection between the client and server is shutdown before using up all the attempts the server will fail to log the clients IP address nor that authentication failed. It will only log that the client disconnected but it will give no indication of why or who the client is.


 

Privacy Statement
Copyright 2010, SecurityFocus