CVE-2008-5161

N/A Unknown
Published: November 19, 2008 Modified: April 23, 2026
View on NVD

Description

Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://openssh.org/txt/cbc.adv
Source: cve@mitre.org
http://osvdb.org/49872
Source: cve@mitre.org
http://osvdb.org/50035
Source: cve@mitre.org
http://osvdb.org/50036
Source: cve@mitre.org
http://secunia.com/advisories/32740
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/32760
Source: cve@mitre.org
Vendor Advisory
http://www.kb.cert.org/vuls/id/958563
Source: cve@mitre.org
US Government Resource
http://www.ssh.com/company/news/article/953/
Source: cve@mitre.org
Vendor Advisory
http://isc.sans.org/diary.html?storyid=5366
Source: af854a3a-2127-422b-91ae-364da2661108
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=125017764422557&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://openssh.org/txt/cbc.adv
Source: af854a3a-2127-422b-91ae-364da2661108
http://osvdb.org/49872
Source: af854a3a-2127-422b-91ae-364da2661108
http://osvdb.org/50035
Source: af854a3a-2127-422b-91ae-364da2661108
http://osvdb.org/50036
Source: af854a3a-2127-422b-91ae-364da2661108
http://rhn.redhat.com/errata/RHSA-2009-1287.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32740
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/32760
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/32833
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33121
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33308
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/34857
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/36558
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.apple.com/kb/HT3937
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.attachmate.com/techdocs/2398.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/958563
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/498558/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/498579/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/32319
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1021235
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1021236
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1021382
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ssh.com/company/news/article/953/
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2008/3172
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/3173
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/3409
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/1135
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/3184
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/46620
Source: af854a3a-2127-422b-91ae-364da2661108
https://kc.mcafee.com/corporate/index?page=content&id=SB10106
Source: af854a3a-2127-422b-91ae-364da2661108
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
Source: af854a3a-2127-422b-91ae-364da2661108

80 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
2.7%
86th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

openbsd ssh