SSH Agent Vulnerabilities

Impact

This document will summarize vulnerabilities in the ssh cryptographic login program. These vulnerabilites enables a malicious user to access a remote host without proper authorization. Numerous flaws have been uncovered in the implementation of the SSH version 1 protocol.

The Problem

All versions of SSH and openSSH up to and including SSH-1.5-1.2.31 are vulnerable to one or more exploits that can result in remote root compromise. There are third party patches that correct most of these exploits but not supported by the ssh vendors.

Resolutions

Vendors recommend upgrading to SSH version 2 protocol products. These exploits do not exist in the newer version 2. If this is not possible, upgrade to SSH-1.5-1.2.31 and apply the patches as defined in the references.

References