CVE-2015-5600
Summary
| CVE | CVE-2015-5600 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2015-08-03 01:59:03 UTC |
| Updated | 2026-05-06 22:30:45 UTC |
| Description | The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
NoneAvailability
CompleteAV:N/AC:L/Au:N/C:P/I:N/A:C
NVD Known Affected Configurations (CPE 2.3)
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| USN-2710-1: OpenSSH vulnerabilities | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | |
| Juniper Networks - 2015-10 Security Bulletin: Junos: OpenSSH brute force keyboard interactive MaxAuthTries bypass (CVE-2015-5600) | af854a3a-2127-422b-91ae-364da2661108 | kb.juniper.net | |
| Arista - Security Advisory 0012 | af854a3a-2127-422b-91ae-364da2661108 | www.arista.com | |
| APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update 2015-006 | af854a3a-2127-422b-91ae-364da2661108 | lists.apple.com | |
| [SECURITY] [DLA 1500-1] openssh security update | af854a3a-2127-422b-91ae-364da2661108 | lists.debian.org | |
| McAfee KnowledgeBase - Intel Security - Security Bulletin: Firewall Enterprise update fixes OpenSSH CVE-2015-5600 and CVE-2015-6564 vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | kc.mcafee.com | |
| OpenSSH: Multiple vulnerabilities (GLSA 201512-04) — Gentoo Security | af854a3a-2127-422b-91ae-364da2661108 | security.gentoo.org | |
| Oracle VM Server for x86 Bulletin - July 2016 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | |
| USN-2710-2: OpenSSH regression | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | |
| About the security content of OS X Yosemite v10.10.5 and Security Update 2015-006 - Apple Support | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| RETIRED: Oracle Integrated Lights Out Manager CVE-2015-5600 Remote Security Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| [SECURITY] Fedora 21 Update: openssh-6.6.1p1-16.fc21 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | |
| Oracle Critical Patch Update - July 2016 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | |
| [SECURITY] Fedora 22 Update: openssh-6.9p1-3.fc22 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | |
| Document Display | HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20566.www2.hpe.com | |
| Oracle Solaris Third Party Bulletin - October 2015 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | |
| Document Display | HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20564.www2.hpe.com | |
| HPE Support document - HPE Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20566.www2.hpe.com | |
| OpenSSH Login Handling Security Bypass Weakness | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| [security-announce] SUSE-SU-2015:1581-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| src/usr.bin/ssh/auth2-chall.c - diff - 1.43 | af854a3a-2127-422b-91ae-364da2661108 | cvsweb.openbsd.org | |
| cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf | af854a3a-2127-422b-91ae-364da2661108 | cert-portal.siemens.com | |
| CVE-2015-5600 OpenSSH MaxAuthTries Bypass Vulnerability in NetApp Products | NetApp Product Security | af854a3a-2127-422b-91ae-364da2661108 | security.netapp.com | |
| OpenSSH 'KbdInteractiveDevices' Lets Remote Users Bypass Security Restrictions on the Target System - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | |
| Oracle Linux Bulletin - October 2015 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | |
| Full Disclosure: OpenSSH keyboard-interactive authentication brute force vulnerability (MaxAuthTries bypass) | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Exploit |
| CPU July 2018 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | |
| Oracle Linux Bulletin - April 2016 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | |
| Oracle July 2016 Critical Patch Update Multiple Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| CVS log for src/usr.bin/ssh/auth2-chall.c | af854a3a-2127-422b-91ae-364da2661108 | cvsweb.openbsd.org | |
| McAfee Security Bulletin: Network Security Virtual Platform update resolves OpenSSH vulnerability that bypasses authentication restrictions defined by MaxAuthTries | af854a3a-2127-422b-91ae-364da2661108 | kc.mcafee.com | |
| oss-security - Re: CVE Request for OpenSSH vulnerability - authentication limits bypass | af854a3a-2127-422b-91ae-364da2661108 | openwall.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 591280 Siemens SCALANCE X-200RNA Switch Devices Denial of Service (DoS) Multiple Vulnerabilities (ICSA-22-349-21, SSA-412672)