cve-2008-5161
Vulnerability from cvelistv5
Published
2008-11-19 17:00
Modified
2024-08-07 10:40
Severity ?
EPSS score ?
Summary
Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:40:17.282Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://openssh.org/txt/cbc.adv" }, { "name": "247186", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1" }, { "name": "32319", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32319" }, { "name": "33121", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33121" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667" }, { "name": "49872", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/49872" }, { "name": "33308", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33308" }, { "name": "RHSA-2009:1287", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2009-1287.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt" }, { "name": "1021382", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021382" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163" }, { "name": "50036", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/50036" }, { "name": "32833", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32833" }, { "name": "36558", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36558" }, { "name": "50035", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/50035" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ssh.com/company/news/article/953/" }, { "name": "1021235", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021235" }, { "name": "34857", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34857" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.attachmate.com/techdocs/2398.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html" }, { "name": "ADV-2008-3173", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/3173" }, { "name": "20081123 Revised: OpenSSH security advisory: cbc.adv", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/498579/100/0/threaded" }, { "name": "openssh-sshtectia-cbc-info-disclosure(46620)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46620" }, { "name": "32740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32740" }, { "name": "ADV-2009-1135", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1135" }, { "name": "32760", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32760" }, { "name": "ADV-2009-3184", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "1021236", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021236" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10106" }, { "name": "HPSBMA02447", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://isc.sans.org/diary.html?storyid=5366" }, { "name": "APPLE-SA-2009-11-09-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "name": "SSRT090062", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "name": "ADV-2008-3409", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/3409" }, { "name": "ADV-2008-3172", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/3172" }, { "name": "oval:org.mitre.oval:def:11279", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279" }, { "name": "20081121 OpenSSH security advisory: cbc.adv", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/498558/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3937" }, { "name": "VU#958563", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/958563" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://openssh.org/txt/cbc.adv" }, { "name": "247186", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1" }, { "name": "32319", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32319" }, { "name": "33121", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33121" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667" }, { "name": "49872", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/49872" }, { "name": "33308", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33308" }, { "name": "RHSA-2009:1287", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2009-1287.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt" }, { "name": "1021382", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021382" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163" }, { "name": "50036", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/50036" }, { "name": "32833", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32833" }, { "name": "36558", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36558" }, { "name": "50035", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/50035" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ssh.com/company/news/article/953/" }, { "name": "1021235", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021235" }, { "name": "34857", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34857" }, { "tags": [ "x_refsource_MISC" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.attachmate.com/techdocs/2398.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html" }, { "name": "ADV-2008-3173", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/3173" }, { "name": "20081123 Revised: OpenSSH security advisory: cbc.adv", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/498579/100/0/threaded" }, { "name": "openssh-sshtectia-cbc-info-disclosure(46620)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46620" }, { "name": "32740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32740" }, { "name": "ADV-2009-1135", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1135" }, { "name": "32760", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32760" }, { "name": "ADV-2009-3184", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "1021236", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021236" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10106" }, { "name": "HPSBMA02447", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://isc.sans.org/diary.html?storyid=5366" }, { "name": "APPLE-SA-2009-11-09-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "name": "SSRT090062", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "name": "ADV-2008-3409", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/3409" }, { "name": "ADV-2008-3172", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/3172" }, { "name": "oval:org.mitre.oval:def:11279", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279" }, { "name": "20081121 OpenSSH security advisory: cbc.adv", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/498558/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3937" }, { "name": "VU#958563", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/958563" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5161", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://openssh.org/txt/cbc.adv", "refsource": "CONFIRM", "url": "http://openssh.org/txt/cbc.adv" }, { "name": "247186", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1" }, { "name": "32319", "refsource": "BID", "url": "http://www.securityfocus.com/bid/32319" }, { "name": "33121", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33121" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667" }, { "name": "49872", "refsource": "OSVDB", "url": "http://osvdb.org/49872" }, { "name": "33308", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33308" }, { "name": "RHSA-2009:1287", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2009-1287.html" }, { "name": "http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt", "refsource": "MISC", "url": "http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt" }, { "name": "1021382", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021382" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163" }, { "name": "50036", "refsource": "OSVDB", "url": "http://osvdb.org/50036" }, { "name": "32833", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32833" }, { "name": "36558", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36558" }, { "name": "50035", "refsource": "OSVDB", "url": "http://osvdb.org/50035" }, { "name": "http://www.ssh.com/company/news/article/953/", "refsource": "CONFIRM", "url": "http://www.ssh.com/company/news/article/953/" }, { "name": "1021235", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021235" }, { "name": "34857", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34857" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm", "refsource": "MISC", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm" }, { "name": "http://support.attachmate.com/techdocs/2398.html", "refsource": "CONFIRM", "url": "http://support.attachmate.com/techdocs/2398.html" }, { "name": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html", "refsource": "CONFIRM", "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html" }, { "name": "ADV-2008-3173", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/3173" }, { "name": "20081123 Revised: OpenSSH security advisory: cbc.adv", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/498579/100/0/threaded" }, { "name": "openssh-sshtectia-cbc-info-disclosure(46620)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46620" }, { "name": "32740", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32740" }, { "name": "ADV-2009-1135", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1135" }, { "name": "32760", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32760" }, { "name": "ADV-2009-3184", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3184" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "1021236", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021236" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10106", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10106" }, { "name": "HPSBMA02447", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "name": "http://isc.sans.org/diary.html?storyid=5366", "refsource": "MISC", "url": "http://isc.sans.org/diary.html?storyid=5366" }, { "name": "APPLE-SA-2009-11-09-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" }, { "name": "SSRT090062", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "name": "ADV-2008-3409", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/3409" }, { "name": "ADV-2008-3172", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/3172" }, { "name": "oval:org.mitre.oval:def:11279", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279" }, { "name": "20081121 OpenSSH security advisory: cbc.adv", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/498558/100/0/threaded" }, { "name": "http://support.apple.com/kb/HT3937", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3937" }, { "name": "VU#958563", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/958563" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-5161", "datePublished": "2008-11-19T17:00:00", "dateReserved": "2008-11-19T00:00:00", "dateUpdated": "2024-08-07T10:40:17.282Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openbsd:openssh:4.7p1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B042083-6D26-4A91-B3F6-E6D46266FF60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6693DC2D-CDA1-4E37-9569-58874F55A48A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16CDE975-9E08-493B-9385-3EC2CABC4A15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A63EA6B-2400-48C4-924D-3509971CCBEE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0658F08E-2596-4D8E-91AA-44A9DBE8F151\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74169893-A34F-49FB-8C83-36C4AA808925\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"013E94CC-AF68-44D0-826F-28B1825A8DA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9981E30-0D54-4464-8287-E450E7E8F770\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4ED17577-F56D-48DF-8863-B4FF039C47D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B74A91E2-C93E-49F4-B349-8E4CEC285C03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3.1j:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBF7244A-BFF7-4C7C-82FF-6B53236DB86D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BADA4CC-FC94-427A-AF93-9AAFDAADDB91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3.2j:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1356E837-2CF3-4AF9-80DD-FA2A97B3B2F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F1D6B7F-8B52-42C0-8613-740CACFB3463\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5024EC6-2A47-4ACE-A661-B78D314C7D0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA64A6E8-0EB7-4BCA-A7AA-245A466C2F22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5058DC44-835D-4BD9-B550-E5CB22F6475F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23ED4911-6CF5-4562-B421-A328D7BE0291\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3.8k:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7F3388A-39FA-4A3A-819A-764A16AAEB54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3.9k:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C90B0480-C558-41BD-A16C-AD63DA1C09C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81DDF3D8-35EA-4677-B1AC-1CA674EEBCD3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F37366E9-F1B6-4458-AE1C-790405AC8740\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C727829-5E3A-41F6-BAB3-01AED39674D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CF57477-FB53-49CC-BAD4-CDC0FD9363F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65FB72FC-37EE-4D42-893E-9C0924EEA2E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.4.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D863ED8D-2B63-4497-B250-6AFA29D6D9D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.4.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2BF5D4C-DFF8-4094-82A6-A1302169CD43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.4.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5C5413C-47F1-4E3B-B618-2AECECA780FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.4.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"490A294D-AB7C-45C2-B887-1C3D2992AD91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.4.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43712853-9002-4778-9036-754262880B3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.4.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41A83090-D05D-40DD-AA29-F032CC165A9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5BCE145-44F4-4FED-8936-3AEBF8B38357\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.0.0f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"888C2DE3-2874-4310-9584-3AC96A82C306\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB6587AA-E91D-4194-81D0-FCF1AA382CAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.0.1f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"237D84A0-3FC3-4CFD-9454-ACD9E42DCC4C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6B2C7F5-8182-48B8-AA8A-C0F45978D3D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.0.2f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5EAC7A0-CD7D-4AE9-8421-9CDFFD073B5C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17855D5D-BDF5-48D3-9D71-694A3D41A826\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.0.3f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3915E4A8-6CCF-44A3-85B9-70651137C084\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A5DEDB4-7E16-4356-B080-09BCDA68772F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC9DBDC7-DDF0-4596-84BC-E4E05F47F938\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36FA61F9-CE29-47B0-AF2A-B1045A59018E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B338837-6346-48FC-A4D7-011EC20ACF61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8644D458-786D-4310-BAA8-40B2E27EA966\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4746C2E-91B1-4341-9CCD-78191BDF9A28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F3FCC3E-F3D5-4F90-B64F-85576E8B776B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17672CBB-A79F-4B91-9B01-193F960A4611\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"177E5CE0-A518-447F-9397-FC527E367077\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C808743-BFAF-4BB4-B0F0-13DF2C7D5531\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB90715C-E50C-4682-8C94-DE5CBCAA9965\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A8F8009-3586-4989-B180-2F46503DA59B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"44DDAAA8-185D-47FE-8434-E2FC000BD926\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2E5D670-FB1F-4560-A5A0-149FB4FCD2CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49A0662D-9356-4DC9-8082-58DBEE5C65FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E858413-3408-4A77-B56D-5016959FC690\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFFB475D-7996-48B3-8886-9000C6230414\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:6.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E56BFE1-044A-45AC-BF9C-C0CFBD2F8C7E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:6.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E72BBCB-636C-4939-90B7-308223E433EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:6.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5884968-F218-4CD4-AD4B-4C0CD26EF674\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:6.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56FD197E-27E9-4AF4-8A84-E1D0A7FD14DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:6.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DCD63A2-B666-4F5E-9D17-ED38B0BF973C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63E32B6A-AF41-4AEA-B55B-52B821106D00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0BC18FBF-1C2E-4D2F-9D3C-C6578CCBDB50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0824B78E-EB43-4D74-9062-79D0F273B06E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A76B02F-C2C8-4A35-A60A-EC74F43B8895\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8CD470B-274F-421C-AD4D-6D076935D741\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C30FE48E-857E-441C-B497-B6E541D2913F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A813EED-25AC-4191-92E8-58C1BC7D1E5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8719CEF9-6753-495B-9ACB-9E323CB7BCDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"553D3277-1B91-4998-A610-7E5D3E2C1413\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17886B3D-394C-4C94-93B2-FAB23B45C880\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7584F9C5-41E9-4F84-9849-B5D604BB55A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.4.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00008DAA-F66D-484B-941B-944F3E684981\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.4.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EEF4DE0B-ED77-49CE-AE0C-2AF2AE35FB78\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.4.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38EF9A76-6D83-4C99-A1DE-DC7E5AF28731\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.4.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C13F8DE-007E-467E-9872-9C4A951F1EE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"698824F0-DDFA-4469-8D42-59A56ACD6B5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30A3B9E9-3643-443B-A19A-2AE989832C50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F86A43A5-0906-405E-B3D0-250DA24A9093\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3126AFB2-A043-4C51-8402-D36D2F62AA73\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B00D37C5-5C79-46F9-97B7-555E48C53796\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55A817B6-CD13-4E0A-99DD-C5C39DF04C8E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C6F7054-6EDF-4F25-945E-E24F00A4A2B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16BEBCBF-8826-4451-9B6B-802BD8A4FA99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59F1EE63-6CF7-440D-BC5B-23D721996275\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C446EEE-3D06-485D-A031-2DA2A6501712\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F90B0C0-1CA9-47F8-B603-D6C15CF33352\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7292ADB-5D2C-4569-93B5-76125D71E3AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2810AD0C-4C6F-4B07-8D72-2D640219AE82\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06C3FAFB-90D2-4C6D-A210-27297926433E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78E26C82-CA31-4EBB-9635-D895B04D90E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connectsecure:6.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"170C4ADE-68C7-4F73-BD64-800D8E07F5E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connectsecure:6.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FB022A4-BFF0-4154-A8B6-C38B6C09A1BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connectsecure:6.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"026CCB02-C710-4AEA-B002-852AD4A3DCDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connectsecure:6.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02ACCEFF-1301-4118-BFCA-877F7A1D84B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connectsecure:6.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"625EE79F-33C9-4272-A37C-F82921950EA2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E4480D2-1B5C-443D-8D7F-976885C33BDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"795DEA94-79D6-4132-B205-AB098E92216A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD05A3E8-105D-4712-8BBE-2D5CF4F78890\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D6691FF-77F2-4AE3-B49F-BFB8744AD046\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E58648AC-7288-46EC-B2BB-0805626BA31C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F8A31AD-D2E8-45DC-BF80-BD102B1FBC83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62FBDA08-566F-4D21-8186-4A287FD2F107\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B1DB64D-028A-422F-B106-873A45789A89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12509D69-71AF-48AF-986F-04A7E248011A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"075B6E8D-4C4B-4E98-94C6-52B842BE65FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEDF9DB2-6C3D-4BF5-BF55-818C3932CF93\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27B99F6E-712C-4205-9185-26F543EFC881\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F31FAA8F-EE03-4A7F-B0DE-BB4CE998FEB8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AF0262B-1451-40CA-9DD1-F2DEA793BD61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C27E0224-9431-49EF-8B32-850CDF6FFFE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88A88A21-7427-4452-8C2A-6C31542FA83C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3DCEAA0-509A-4978-BE53-0CBE084366FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3203DC73-05F2-4A28-9E62-3D87B482586A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BDA1AAC-3FCF-47D8-A6B4-9DB0D776CE14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64F4CDF1-695A-4677-A829-74BB365BF4FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BBEF55DD-FC87-42A3-9DAF-9862AA9649CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61188360-C55E-47AD-8C3E-043689249DA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A5BCE08-8940-4658-A4D7-5CAD33D3751C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC0FA974-7671-4FB7-BB36-274B5970EBAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"011F841A-4F1B-49B2-B379-9FE126141568\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3C54819-CF51-4BBE-873F-4A0E2072D10F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"743C5472-860C-48A6-AED7-BB00B6E91440\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2094ACB3-635A-437D-AF0E-4BFEB496EDF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40BE9A01-DEE5-4CD4-8C01-6689707A47EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2838C7E9-F247-491B-AAD1-680927044C24\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EAB99E2A-AF4D-4436-9C4F-EB043F8D16A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86E5680C-2E57-4BFA-9D60-B560BA819039\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83D8769C-E438-4805-955A-4EA7A274F036\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B2E96C8-F8F8-4002-B242-3ADDF1E84B7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2ADC814-3F33-47F6-AE27-7233F5D337AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B56052F-6768-41D6-9E91-F1377EB4E122\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9803DD4B-C48D-45EA-8154-C1C626DBDED2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"702A52AE-4E48-4138-8856-9EBE5A8DA964\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.1.1:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"B8C108AB-0C7C-4B58-8B54-C92C95A6B65D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"509B3B08-533C-46CE-B53F-5A2BFC553C53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0F992DB-F70C-4473-8C33-B5F59BD83A57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84D8E570-70B9-42CF-9764-238AAF6B380F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.2.0:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"9E582465-CC4A-4827-8C1F-548F01D6FCF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.2.1:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"60515678-F93E-46CC-94EF-0EF9B2091D76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4054251B-98C7-4AC9-B610-BA0EB250972C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.2.2:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"5B4AC671-C67D-46EC-9FB2-720F0DC3D4EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A93E9C5-91A4-4FC1-871B-ECE0E0FAFAA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"958F4FB0-C7DA-48D8-9500-A4A43ED807E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D772EE8-FB18-4431-89D8-FAF42797A2DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.3.0:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"A3A30FB0-35AB-4CF2-B74D-68015044770B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75DA0AC9-E2BF-40C7-B970-43D0283FCC6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA26CDDC-24FD-4FFD-BA5E-79F55BC8DA00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1003EDA5-E22E-4A4E-A289-660E823EE71F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"844003FE-63E9-4E2F-83E6-02798B753FB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7ED73DCC-6501-4DA8-B0C0-45F1A6E97BF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"711A3119-3390-48A9-8579-1D768D66386D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"798BE0FE-52F1-4283-8A0D-3E769A3752C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F77CD27-4E7E-4B4A-9363-FC87B611338A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.4.0:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"09B1AFF1-4F5D-42F0-A3A7-91BB9854B561\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.4.1:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"01872E42-E249-48AB-9259-FF3B0F3CAA4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.4.2:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"B73B06FD-3452-4900-AE09-44172A1EF174\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.5.0:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"DC126AA4-30B6-429B-A981-E4F0BCE03DE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.5.1:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"1932FFE5-DC06-4560-ADA7-4C993B8A880D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:6.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67BA8F3E-57F3-4388-8CD0-431AAA8DDB36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:6.0.0:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"2BDEED3F-3936-429C-957E-9E3EE455445C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:6.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71C39323-60AF-4CB5-BA5A-1F45353614F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:6.0.1:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"3FE3D768-A3CF-422A-9EE2-6256E3ADDBEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:6.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D8E4B95-A551-4839-995F-5667CD215540\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:6.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B474CD5-DEC0-49DB-992D-658A3C573982\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:6.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB98ADBD-7FBB-4495-A71B-8EF9A6EAC33B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:6.0.4:*:linux_ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"356A4B29-4BE7-4D33-8B64-CECCA6C24FAF\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors.\"}, {\"lang\": \"es\", \"value\": \"Error en el manejo del protocolo SSH en (1) SSH Tectia Client y Server y Connector 4v.0 a la v4.4.11, v5.0 a la v5.2.4, y v5.3 a la v5.3.8; Client y Server y ConnectSecure v6.0 a la v6.0.4; Server para Linux sobre IBM System z v6.0.4; Server para IBM z/OS v5.5.1 y anteriores, v6.0.0, y v6.0.1; y Client v4.0-J a la v4.3.3-J y v4.0-K a la v4.3.10-K; y (2) OpenSSH v4.7p1 y posiblemente otras versiones, cuando usan un algoritmo de bloque cifrado en el modo Cipher Block Chaining (CBC), facilita a los atacantes remotos el conseguir cierta informaci\\u00f3n en texto plano desde cualquier bloque de texto cifrado de su elecci\\u00f3n en una sessi\\u00f3n SSH mediante vectores de ataque desconocidos.\"}]", "evaluatorComment": "http://securitytracker.com/alerts/2008/Nov/1021235.html\n\nCBC mode connections are affected", "evaluatorSolution": "With a valid username and password patches are available at the following link:\nhttps://downloads.ssh.com/", "id": "CVE-2008-5161", "lastModified": "2024-11-21T00:53:25.890", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:H/Au:N/C:P/I:N/A:N\", \"baseScore\": 2.6, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"HIGH\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 4.9, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2008-11-19T17:30:00.670", "references": "[{\"url\": \"http://isc.sans.org/diary.html?storyid=5366\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://openssh.org/txt/cbc.adv\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/49872\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/50035\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/50036\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2009-1287.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/32740\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/32760\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/32833\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/33121\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/33308\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/34857\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/36558\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://support.apple.com/kb/HT3937\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://support.attachmate.com/techdocs/2398.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/958563\", \"source\": \"cve@mitre.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/498558/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/498579/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/32319\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id?1021235\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id?1021236\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id?1021382\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.ssh.com/company/news/article/953/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/3172\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/3173\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/3409\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1135\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3184\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/46620\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10106\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://isc.sans.org/diary.html?storyid=5366\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://openssh.org/txt/cbc.adv\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/49872\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/50035\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/50036\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2009-1287.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/32740\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/32760\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/32833\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/33121\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/33308\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/34857\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/36558\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.apple.com/kb/HT3937\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.attachmate.com/techdocs/2398.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/958563\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/498558/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/498579/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/32319\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1021235\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1021236\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1021382\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ssh.com/company/news/article/953/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/3172\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/3173\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/3409\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1135\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3184\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/46620\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10106\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "cve@mitre.org", "vendorComments": "[{\"organization\": \"Red Hat\", \"comment\": \"This issue was addressed for Red Hat Enterprise Linux 5 by\\nhttps://rhn.redhat.com/errata/RHSA-2009-1287.html\\n\\nAfter reviewing the upstream fix for this issue, Red Hat does not intend to address this flaw in Red Hat Enterprise Linux 3 or 4 at this time.\", \"lastModified\": \"2009-09-02T00:00:00\"}]", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2008-5161\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-11-19T17:30:00.670\",\"lastModified\":\"2024-11-21T00:53:25.890\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors.\"},{\"lang\":\"es\",\"value\":\"Error en el manejo del protocolo SSH en (1) SSH Tectia Client y Server y Connector 4v.0 a la v4.4.11, v5.0 a la v5.2.4, y v5.3 a la v5.3.8; Client y Server y ConnectSecure v6.0 a la v6.0.4; Server para Linux sobre IBM System z v6.0.4; Server para IBM z/OS v5.5.1 y anteriores, v6.0.0, y v6.0.1; y Client v4.0-J a la v4.3.3-J y v4.0-K a la v4.3.10-K; y (2) OpenSSH v4.7p1 y posiblemente otras versiones, cuando usan un algoritmo de bloque cifrado en el modo Cipher Block Chaining (CBC), facilita a los atacantes remotos el conseguir cierta informaci\u00f3n en texto plano desde cualquier bloque de texto cifrado de su elecci\u00f3n en una sessi\u00f3n SSH mediante vectores de ataque desconocidos.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:N/A:N\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:4.7p1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B042083-6D26-4A91-B3F6-E6D46266FF60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6693DC2D-CDA1-4E37-9569-58874F55A48A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16CDE975-9E08-493B-9385-3EC2CABC4A15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A63EA6B-2400-48C4-924D-3509971CCBEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0658F08E-2596-4D8E-91AA-44A9DBE8F151\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74169893-A34F-49FB-8C83-36C4AA808925\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"013E94CC-AF68-44D0-826F-28B1825A8DA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9981E30-0D54-4464-8287-E450E7E8F770\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ED17577-F56D-48DF-8863-B4FF039C47D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B74A91E2-C93E-49F4-B349-8E4CEC285C03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3.1j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBF7244A-BFF7-4C7C-82FF-6B53236DB86D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BADA4CC-FC94-427A-AF93-9AAFDAADDB91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3.2j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1356E837-2CF3-4AF9-80DD-FA2A97B3B2F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F1D6B7F-8B52-42C0-8613-740CACFB3463\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5024EC6-2A47-4ACE-A661-B78D314C7D0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA64A6E8-0EB7-4BCA-A7AA-245A466C2F22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5058DC44-835D-4BD9-B550-E5CB22F6475F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23ED4911-6CF5-4562-B421-A328D7BE0291\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3.8k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7F3388A-39FA-4A3A-819A-764A16AAEB54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3.9k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C90B0480-C558-41BD-A16C-AD63DA1C09C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81DDF3D8-35EA-4677-B1AC-1CA674EEBCD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F37366E9-F1B6-4458-AE1C-790405AC8740\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C727829-5E3A-41F6-BAB3-01AED39674D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CF57477-FB53-49CC-BAD4-CDC0FD9363F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65FB72FC-37EE-4D42-893E-9C0924EEA2E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D863ED8D-2B63-4497-B250-6AFA29D6D9D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2BF5D4C-DFF8-4094-82A6-A1302169CD43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5C5413C-47F1-4E3B-B618-2AECECA780FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"490A294D-AB7C-45C2-B887-1C3D2992AD91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43712853-9002-4778-9036-754262880B3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41A83090-D05D-40DD-AA29-F032CC165A9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5BCE145-44F4-4FED-8936-3AEBF8B38357\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.0.0f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"888C2DE3-2874-4310-9584-3AC96A82C306\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB6587AA-E91D-4194-81D0-FCF1AA382CAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.0.1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"237D84A0-3FC3-4CFD-9454-ACD9E42DCC4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6B2C7F5-8182-48B8-AA8A-C0F45978D3D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.0.2f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5EAC7A0-CD7D-4AE9-8421-9CDFFD073B5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17855D5D-BDF5-48D3-9D71-694A3D41A826\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.0.3f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3915E4A8-6CCF-44A3-85B9-70651137C084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A5DEDB4-7E16-4356-B080-09BCDA68772F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC9DBDC7-DDF0-4596-84BC-E4E05F47F938\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36FA61F9-CE29-47B0-AF2A-B1045A59018E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B338837-6346-48FC-A4D7-011EC20ACF61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8644D458-786D-4310-BAA8-40B2E27EA966\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4746C2E-91B1-4341-9CCD-78191BDF9A28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F3FCC3E-F3D5-4F90-B64F-85576E8B776B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17672CBB-A79F-4B91-9B01-193F960A4611\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"177E5CE0-A518-447F-9397-FC527E367077\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C808743-BFAF-4BB4-B0F0-13DF2C7D5531\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB90715C-E50C-4682-8C94-DE5CBCAA9965\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A8F8009-3586-4989-B180-2F46503DA59B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44DDAAA8-185D-47FE-8434-E2FC000BD926\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2E5D670-FB1F-4560-A5A0-149FB4FCD2CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49A0662D-9356-4DC9-8082-58DBEE5C65FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E858413-3408-4A77-B56D-5016959FC690\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFFB475D-7996-48B3-8886-9000C6230414\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E56BFE1-044A-45AC-BF9C-C0CFBD2F8C7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E72BBCB-636C-4939-90B7-308223E433EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5884968-F218-4CD4-AD4B-4C0CD26EF674\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56FD197E-27E9-4AF4-8A84-E1D0A7FD14DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DCD63A2-B666-4F5E-9D17-ED38B0BF973C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63E32B6A-AF41-4AEA-B55B-52B821106D00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BC18FBF-1C2E-4D2F-9D3C-C6578CCBDB50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0824B78E-EB43-4D74-9062-79D0F273B06E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A76B02F-C2C8-4A35-A60A-EC74F43B8895\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8CD470B-274F-421C-AD4D-6D076935D741\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C30FE48E-857E-441C-B497-B6E541D2913F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A813EED-25AC-4191-92E8-58C1BC7D1E5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8719CEF9-6753-495B-9ACB-9E323CB7BCDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"553D3277-1B91-4998-A610-7E5D3E2C1413\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17886B3D-394C-4C94-93B2-FAB23B45C880\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7584F9C5-41E9-4F84-9849-B5D604BB55A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00008DAA-F66D-484B-941B-944F3E684981\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEF4DE0B-ED77-49CE-AE0C-2AF2AE35FB78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38EF9A76-6D83-4C99-A1DE-DC7E5AF28731\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C13F8DE-007E-467E-9872-9C4A951F1EE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"698824F0-DDFA-4469-8D42-59A56ACD6B5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30A3B9E9-3643-443B-A19A-2AE989832C50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F86A43A5-0906-405E-B3D0-250DA24A9093\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3126AFB2-A043-4C51-8402-D36D2F62AA73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B00D37C5-5C79-46F9-97B7-555E48C53796\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55A817B6-CD13-4E0A-99DD-C5C39DF04C8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C6F7054-6EDF-4F25-945E-E24F00A4A2B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16BEBCBF-8826-4451-9B6B-802BD8A4FA99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59F1EE63-6CF7-440D-BC5B-23D721996275\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C446EEE-3D06-485D-A031-2DA2A6501712\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F90B0C0-1CA9-47F8-B603-D6C15CF33352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7292ADB-5D2C-4569-93B5-76125D71E3AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2810AD0C-4C6F-4B07-8D72-2D640219AE82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06C3FAFB-90D2-4C6D-A210-27297926433E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78E26C82-CA31-4EBB-9635-D895B04D90E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connectsecure:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"170C4ADE-68C7-4F73-BD64-800D8E07F5E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connectsecure:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FB022A4-BFF0-4154-A8B6-C38B6C09A1BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connectsecure:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"026CCB02-C710-4AEA-B002-852AD4A3DCDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connectsecure:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02ACCEFF-1301-4118-BFCA-877F7A1D84B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connectsecure:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"625EE79F-33C9-4272-A37C-F82921950EA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E4480D2-1B5C-443D-8D7F-976885C33BDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"795DEA94-79D6-4132-B205-AB098E92216A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD05A3E8-105D-4712-8BBE-2D5CF4F78890\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D6691FF-77F2-4AE3-B49F-BFB8744AD046\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E58648AC-7288-46EC-B2BB-0805626BA31C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F8A31AD-D2E8-45DC-BF80-BD102B1FBC83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62FBDA08-566F-4D21-8186-4A287FD2F107\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B1DB64D-028A-422F-B106-873A45789A89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12509D69-71AF-48AF-986F-04A7E248011A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"075B6E8D-4C4B-4E98-94C6-52B842BE65FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEDF9DB2-6C3D-4BF5-BF55-818C3932CF93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27B99F6E-712C-4205-9185-26F543EFC881\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F31FAA8F-EE03-4A7F-B0DE-BB4CE998FEB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AF0262B-1451-40CA-9DD1-F2DEA793BD61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C27E0224-9431-49EF-8B32-850CDF6FFFE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88A88A21-7427-4452-8C2A-6C31542FA83C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3DCEAA0-509A-4978-BE53-0CBE084366FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3203DC73-05F2-4A28-9E62-3D87B482586A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BDA1AAC-3FCF-47D8-A6B4-9DB0D776CE14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64F4CDF1-695A-4677-A829-74BB365BF4FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBEF55DD-FC87-42A3-9DAF-9862AA9649CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61188360-C55E-47AD-8C3E-043689249DA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A5BCE08-8940-4658-A4D7-5CAD33D3751C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC0FA974-7671-4FB7-BB36-274B5970EBAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"011F841A-4F1B-49B2-B379-9FE126141568\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3C54819-CF51-4BBE-873F-4A0E2072D10F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"743C5472-860C-48A6-AED7-BB00B6E91440\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2094ACB3-635A-437D-AF0E-4BFEB496EDF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40BE9A01-DEE5-4CD4-8C01-6689707A47EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2838C7E9-F247-491B-AAD1-680927044C24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAB99E2A-AF4D-4436-9C4F-EB043F8D16A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E5680C-2E57-4BFA-9D60-B560BA819039\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83D8769C-E438-4805-955A-4EA7A274F036\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B2E96C8-F8F8-4002-B242-3ADDF1E84B7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2ADC814-3F33-47F6-AE27-7233F5D337AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B56052F-6768-41D6-9E91-F1377EB4E122\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9803DD4B-C48D-45EA-8154-C1C626DBDED2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"702A52AE-4E48-4138-8856-9EBE5A8DA964\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.1.1:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"B8C108AB-0C7C-4B58-8B54-C92C95A6B65D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"509B3B08-533C-46CE-B53F-5A2BFC553C53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0F992DB-F70C-4473-8C33-B5F59BD83A57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84D8E570-70B9-42CF-9764-238AAF6B380F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.2.0:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"9E582465-CC4A-4827-8C1F-548F01D6FCF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.2.1:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"60515678-F93E-46CC-94EF-0EF9B2091D76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4054251B-98C7-4AC9-B610-BA0EB250972C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.2.2:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"5B4AC671-C67D-46EC-9FB2-720F0DC3D4EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A93E9C5-91A4-4FC1-871B-ECE0E0FAFAA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"958F4FB0-C7DA-48D8-9500-A4A43ED807E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D772EE8-FB18-4431-89D8-FAF42797A2DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.3.0:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"A3A30FB0-35AB-4CF2-B74D-68015044770B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75DA0AC9-E2BF-40C7-B970-43D0283FCC6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA26CDDC-24FD-4FFD-BA5E-79F55BC8DA00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1003EDA5-E22E-4A4E-A289-660E823EE71F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"844003FE-63E9-4E2F-83E6-02798B753FB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ED73DCC-6501-4DA8-B0C0-45F1A6E97BF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"711A3119-3390-48A9-8579-1D768D66386D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"798BE0FE-52F1-4283-8A0D-3E769A3752C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F77CD27-4E7E-4B4A-9363-FC87B611338A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.4.0:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"09B1AFF1-4F5D-42F0-A3A7-91BB9854B561\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.4.1:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"01872E42-E249-48AB-9259-FF3B0F3CAA4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.4.2:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"B73B06FD-3452-4900-AE09-44172A1EF174\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.5.0:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"DC126AA4-30B6-429B-A981-E4F0BCE03DE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.5.1:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"1932FFE5-DC06-4560-ADA7-4C993B8A880D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67BA8F3E-57F3-4388-8CD0-431AAA8DDB36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:6.0.0:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"2BDEED3F-3936-429C-957E-9E3EE455445C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71C39323-60AF-4CB5-BA5A-1F45353614F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:6.0.1:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"3FE3D768-A3CF-422A-9EE2-6256E3ADDBEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D8E4B95-A551-4839-995F-5667CD215540\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B474CD5-DEC0-49DB-992D-658A3C573982\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB98ADBD-7FBB-4495-A71B-8EF9A6EAC33B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:6.0.4:*:linux_ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"356A4B29-4BE7-4D33-8B64-CECCA6C24FAF\"}]}]}],\"references\":[{\"url\":\"http://isc.sans.org/diary.html?storyid=5366\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://openssh.org/txt/cbc.adv\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/49872\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/50035\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/50036\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2009-1287.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/32740\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32760\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32833\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/33121\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/33308\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/34857\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/36558\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.apple.com/kb/HT3937\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.attachmate.com/techdocs/2398.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/958563\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/498558/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/498579/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/32319\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1021235\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1021236\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1021382\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ssh.com/company/news/article/953/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/3172\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/3173\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/3409\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1135\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3184\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/46620\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10106\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://isc.sans.org/diary.html?storyid=5366\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://openssh.org/txt/cbc.adv\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/49872\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/50035\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/50036\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2009-1287.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32740\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32760\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32833\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/33121\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/33308\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/34857\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36558\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT3937\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.attachmate.com/techdocs/2398.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/958563\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/498558/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/498579/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/32319\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1021235\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1021236\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1021382\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ssh.com/company/news/article/953/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/3172\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/3173\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/3409\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1135\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3184\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/46620\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10106\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorComment\":\"http://securitytracker.com/alerts/2008/Nov/1021235.html\\n\\nCBC mode connections are affected\",\"evaluatorSolution\":\"With a valid username and password patches are available at the following link:\\nhttps://downloads.ssh.com/\",\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"This issue was addressed for Red Hat Enterprise Linux 5 by\\nhttps://rhn.redhat.com/errata/RHSA-2009-1287.html\\n\\nAfter reviewing the upstream fix for this issue, Red Hat does not intend to address this flaw in Red Hat Enterprise Linux 3 or 4 at this time.\",\"lastModified\":\"2009-09-02T00:00:00\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.