Article F89C OpenSSH keyboard-interactive authentication brute force vulnerability (MaxAuthTries bypass)

OpenSSH keyboard-interactive authentication brute force vulnerability (MaxAuthTries bypass)

by
from on (#F89C)
Story ImageOpenSSH has a default value of six authentication tries before it will close the connection (the ssh client allows only three password entries per default). With this vulnerability an attacker is able to request as many password prompts limited by the "login graced time" setting, that is set to two minutes by default.
External Content
Source RSS or Atom Feed
Feed Location http://lxer.com/module/newswire/headlines.rdf/
Feed Title
Feed Link http://lxer.com/
Reply 0 comments