Plugin ID | 155 |
Plugin name | SSH server protocol mismatch detection |
Plugin filename | SSH server protocol mismatch detection.plugin |
Plugin filesize | 3303 bytes |
Plugin family | Enumeration |
Plugin created name | Marc Ruef |
Plugin created email | marc dot ruef at computec dot ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2004/09/06 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/13 |
Plugin version | 1.3 |
Plugin changelog | Added NetRecon rating in version 1.2. Corrected the plugin structure and added the accuracy values in 1.3 |
Plugin protocol | tcp |
Plugin port | 22 |
Plugin procedure detection | open|send \n|sleep|close|pattern_exists Protocol mismatch. |
Plugin detection accuracy | 90 |
Plugin comment | This ATK is more accurate than most of the other known vulnerability scanners. |
Bug affected | SSH daemons (especially OpenSSH) |
Bug not affected | SSH daemons 2.0-3.2.3 and other remote-control solutions |
Bug vulnerability class | Configuration |
Bug description | The remote host is running a SSH daemon (secure shell). This could be determined by opening a tcp connection, sending a simple command and looking for a pattern that indicates the use of a wrong protocol (usually is this "Protocol mismatch"). An attacker may use this information to start further enumeration or attacks on the target host. It may also be possible that this SSH server is an unwanted backdoor. |
Bug solution | If the SSH server is unused, de-install or de-activate it. If this is not possible, upgrade your SSH server to the latest version to prevent to be vulnerable to known bugs. Try to install the SSH server to another port to make portscanning on default ports harder. Also limit unwanted connections and communications with firewalling. |
Bug fixing time | Approx. 45 minutes |
Bug exploit availability | Yes |
Bug exploit url | http://www.rapid7.com/Product-Download.html |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Low |
Bug popularity | 7 |
Bug simplicity | 6 |
Bug impact | 3 |
Bug risk | 5 |
Bug Symantec NetRecon rating | 19 |
Bug check tools | Most security scanners are able to do similar checks. |
Source CVE | CVE-2001-0080 |
Source ISS X-Force ID | 5760 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.cisco.com/warp/public/707/catalyst-ssh-protocolmismatch-pub.shtml |