First published: Tue Aug 23 2005(Updated: )
SSH, as implemented in OpenSSH before 4.0 and possibly other implementations, stores hostnames, IP addresses, and keys in plaintext in the known_hosts file, which makes it easier for an attacker that has compromised an SSH user's account to generate a list of additional targets that are more likely to have the same password or key.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | =3.0 | |
OpenSSH | =3.0.1 | |
OpenSSH | =3.0.1p1 | |
OpenSSH | =3.0.2 | |
OpenSSH | =3.0.2p1 | |
OpenSSH | =3.0p1 | |
OpenSSH | =3.1 | |
OpenSSH | =3.1p1 | |
OpenSSH | =3.2 | |
OpenSSH | =3.2.2p1 | |
OpenSSH | =3.2.3p1 | |
OpenSSH | =3.3 | |
OpenSSH | =3.3p1 | |
OpenSSH | =3.4 | |
OpenSSH | =3.4p1 | |
OpenSSH | =3.5 | |
OpenSSH | =3.5p1 | |
OpenSSH | =3.6 | |
OpenSSH | =3.6.1 | |
OpenSSH | =3.6.1p1 | |
OpenSSH | =3.6.1p2 | |
OpenSSH | =3.7 | |
OpenSSH | =3.7.1 | |
OpenSSH | =3.7.1p2 | |
OpenSSH | =3.8 | |
OpenSSH | =3.8.1 | |
OpenSSH | =3.8.1p1 | |
OpenSSH | =3.9 | |
OpenSSH | =3.9.1 | |
OpenSSH | =3.9.1p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2666 is considered a moderate severity vulnerability due to the exposure of sensitive information in plaintext.
To mitigate CVE-2005-2666, upgrade to OpenSSH version 4.0 or later which addresses this vulnerability.
CVE-2005-2666 exploits the storage of hostnames, IP addresses, and keys in plaintext in the known_hosts file of OpenSSH.
CVE-2005-2666 affects OpenSSH versions prior to 4.0.
The risks associated with CVE-2005-2666 include unauthorized access, as attackers can easily identify and target additional systems using the exposed information.