Plugin ID | 210 |
Plugin name | OpenSSH daemon detection |
Plugin filename | OpenSSH daemon detection.plugin |
Plugin filesize | 2949 bytes |
Plugin family | Enumeration |
Plugin created name | Marc Ruef |
Plugin created email | marc dot ruef at computec dot ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2004/09/13 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/13 |
Plugin version | 1.1 |
Plugin changelog | Corrected the plugin structure and added the accuracy values in 1.1 |
Plugin protocol | tcp |
Plugin port | 22 |
Plugin procedure detection | open|sleep|close|pattern_exists -OpenSSH |
Plugin detection accuracy | 90 |
Plugin comment | This plugin was written with the ATK Attack Editor. |
Bug affected | OpenSSH |
Bug not affected | Other SSH daemons or solutions |
Bug vulnerability class | Configuration |
Bug description | The remote host is running an OpenSSH daemon (secure shell). This could be determined by opening a tcp connection and grabbing the banner. An attacker may use this information to start further enumeration or attacks on the target host. It may also be possible that this OpenSSH server is an unwanted backdoor. |
Bug solution | If the SSH server is unused, de-install or de-activate it. If this is not possible, upgrade your SSH server to the latest version to prevent to be vulnerable to known bugs. Try to install the SSH server to another port to make portscanning on default ports harder. Also limit unwanted connections and communications with firewalling. |
Bug fixing time | Approx. 45 minutes |
Bug exploit availability | Yes |
Bug exploit url | http://www.rapid7.com/Product-Download.html |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Low |
Bug popularity | 5 |
Bug simplicity | 7 |
Bug impact | 4 |
Bug risk | 5 |
Bug Symantec NetRecon rating | 39 |
Bug check tools | Most security scanners are able to do similar checks. |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0872 |