cve-2008-5161
Vulnerability from cvelistv5
Published
2008-11-19 17:00
Modified
2024-08-07 10:40
Severity ?
Summary
Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors.
References
cve@mitre.orghttp://isc.sans.org/diary.html?storyid=5366
cve@mitre.orghttp://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
cve@mitre.orghttp://marc.info/?l=bugtraq&m=125017764422557&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=125017764422557&w=2
cve@mitre.orghttp://openssh.org/txt/cbc.adv
cve@mitre.orghttp://osvdb.org/49872
cve@mitre.orghttp://osvdb.org/50035
cve@mitre.orghttp://osvdb.org/50036
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2009-1287.html
cve@mitre.orghttp://secunia.com/advisories/32740Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/32760Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/32833
cve@mitre.orghttp://secunia.com/advisories/33121
cve@mitre.orghttp://secunia.com/advisories/33308
cve@mitre.orghttp://secunia.com/advisories/34857
cve@mitre.orghttp://secunia.com/advisories/36558
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1
cve@mitre.orghttp://support.apple.com/kb/HT3937
cve@mitre.orghttp://support.attachmate.com/techdocs/2398.html
cve@mitre.orghttp://support.avaya.com/elmodocs2/security/ASA-2008-503.htm
cve@mitre.orghttp://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt
cve@mitre.orghttp://www.kb.cert.org/vuls/id/958563US Government Resource
cve@mitre.orghttp://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/498558/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/498579/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/32319
cve@mitre.orghttp://www.securitytracker.com/id?1021235
cve@mitre.orghttp://www.securitytracker.com/id?1021236
cve@mitre.orghttp://www.securitytracker.com/id?1021382
cve@mitre.orghttp://www.ssh.com/company/news/article/953/Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/3172
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/3173
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/3409
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/1135
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/3184
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/46620
cve@mitre.orghttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
cve@mitre.orghttps://kc.mcafee.com/corporate/index?page=content&id=SB10106
cve@mitre.orghttps://kc.mcafee.com/corporate/index?page=content&id=SB10163
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279
af854a3a-2127-422b-91ae-364da2661108http://isc.sans.org/diary.html?storyid=5366
af854a3a-2127-422b-91ae-364da2661108http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=125017764422557&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=125017764422557&w=2
af854a3a-2127-422b-91ae-364da2661108http://openssh.org/txt/cbc.adv
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/49872
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/50035
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/50036
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2009-1287.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32740Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32760Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32833
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33121
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33308
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34857
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36558
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT3937
af854a3a-2127-422b-91ae-364da2661108http://support.attachmate.com/techdocs/2398.html
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm
af854a3a-2127-422b-91ae-364da2661108http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/958563US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/498558/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/498579/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/32319
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1021235
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1021236
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1021382
af854a3a-2127-422b-91ae-364da2661108http://www.ssh.com/company/news/article/953/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/3172
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/3173
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/3409
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1135
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/3184
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/46620
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
af854a3a-2127-422b-91ae-364da2661108https://kc.mcafee.com/corporate/index?page=content&id=SB10106
af854a3a-2127-422b-91ae-364da2661108https://kc.mcafee.com/corporate/index?page=content&id=SB10163
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:40:17.282Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://openssh.org/txt/cbc.adv"
          },
          {
            "name": "247186",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1"
          },
          {
            "name": "32319",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/32319"
          },
          {
            "name": "33121",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33121"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667"
          },
          {
            "name": "49872",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/49872"
          },
          {
            "name": "33308",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33308"
          },
          {
            "name": "RHSA-2009:1287",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2009-1287.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt"
          },
          {
            "name": "1021382",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1021382"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163"
          },
          {
            "name": "50036",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/50036"
          },
          {
            "name": "32833",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32833"
          },
          {
            "name": "36558",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36558"
          },
          {
            "name": "50035",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/50035"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ssh.com/company/news/article/953/"
          },
          {
            "name": "1021235",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1021235"
          },
          {
            "name": "34857",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34857"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.attachmate.com/techdocs/2398.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html"
          },
          {
            "name": "ADV-2008-3173",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/3173"
          },
          {
            "name": "20081123 Revised: OpenSSH security advisory: cbc.adv",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/498579/100/0/threaded"
          },
          {
            "name": "openssh-sshtectia-cbc-info-disclosure(46620)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46620"
          },
          {
            "name": "32740",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32740"
          },
          {
            "name": "ADV-2009-1135",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1135"
          },
          {
            "name": "32760",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32760"
          },
          {
            "name": "ADV-2009-3184",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3184"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
          },
          {
            "name": "1021236",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1021236"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10106"
          },
          {
            "name": "HPSBMA02447",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://isc.sans.org/diary.html?storyid=5366"
          },
          {
            "name": "APPLE-SA-2009-11-09-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
          },
          {
            "name": "SSRT090062",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2"
          },
          {
            "name": "ADV-2008-3409",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/3409"
          },
          {
            "name": "ADV-2008-3172",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/3172"
          },
          {
            "name": "oval:org.mitre.oval:def:11279",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279"
          },
          {
            "name": "20081121 OpenSSH security advisory: cbc.adv",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/498558/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT3937"
          },
          {
            "name": "VU#958563",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/958563"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-11-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://openssh.org/txt/cbc.adv"
        },
        {
          "name": "247186",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1"
        },
        {
          "name": "32319",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/32319"
        },
        {
          "name": "33121",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33121"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667"
        },
        {
          "name": "49872",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/49872"
        },
        {
          "name": "33308",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33308"
        },
        {
          "name": "RHSA-2009:1287",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2009-1287.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt"
        },
        {
          "name": "1021382",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1021382"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163"
        },
        {
          "name": "50036",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/50036"
        },
        {
          "name": "32833",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32833"
        },
        {
          "name": "36558",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36558"
        },
        {
          "name": "50035",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/50035"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ssh.com/company/news/article/953/"
        },
        {
          "name": "1021235",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1021235"
        },
        {
          "name": "34857",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34857"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.attachmate.com/techdocs/2398.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html"
        },
        {
          "name": "ADV-2008-3173",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/3173"
        },
        {
          "name": "20081123 Revised: OpenSSH security advisory: cbc.adv",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/498579/100/0/threaded"
        },
        {
          "name": "openssh-sshtectia-cbc-info-disclosure(46620)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46620"
        },
        {
          "name": "32740",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32740"
        },
        {
          "name": "ADV-2009-1135",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1135"
        },
        {
          "name": "32760",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32760"
        },
        {
          "name": "ADV-2009-3184",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3184"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
        },
        {
          "name": "1021236",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1021236"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10106"
        },
        {
          "name": "HPSBMA02447",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://isc.sans.org/diary.html?storyid=5366"
        },
        {
          "name": "APPLE-SA-2009-11-09-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
        },
        {
          "name": "SSRT090062",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2"
        },
        {
          "name": "ADV-2008-3409",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/3409"
        },
        {
          "name": "ADV-2008-3172",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/3172"
        },
        {
          "name": "oval:org.mitre.oval:def:11279",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279"
        },
        {
          "name": "20081121 OpenSSH security advisory: cbc.adv",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/498558/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT3937"
        },
        {
          "name": "VU#958563",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/958563"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-5161",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://openssh.org/txt/cbc.adv",
              "refsource": "CONFIRM",
              "url": "http://openssh.org/txt/cbc.adv"
            },
            {
              "name": "247186",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1"
            },
            {
              "name": "32319",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/32319"
            },
            {
              "name": "33121",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33121"
            },
            {
              "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667",
              "refsource": "CONFIRM",
              "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667"
            },
            {
              "name": "49872",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/49872"
            },
            {
              "name": "33308",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33308"
            },
            {
              "name": "RHSA-2009:1287",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2009-1287.html"
            },
            {
              "name": "http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt",
              "refsource": "MISC",
              "url": "http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt"
            },
            {
              "name": "1021382",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1021382"
            },
            {
              "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163",
              "refsource": "CONFIRM",
              "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163"
            },
            {
              "name": "50036",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/50036"
            },
            {
              "name": "32833",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32833"
            },
            {
              "name": "36558",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36558"
            },
            {
              "name": "50035",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/50035"
            },
            {
              "name": "http://www.ssh.com/company/news/article/953/",
              "refsource": "CONFIRM",
              "url": "http://www.ssh.com/company/news/article/953/"
            },
            {
              "name": "1021235",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1021235"
            },
            {
              "name": "34857",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34857"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm",
              "refsource": "MISC",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm"
            },
            {
              "name": "http://support.attachmate.com/techdocs/2398.html",
              "refsource": "CONFIRM",
              "url": "http://support.attachmate.com/techdocs/2398.html"
            },
            {
              "name": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html",
              "refsource": "CONFIRM",
              "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html"
            },
            {
              "name": "ADV-2008-3173",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/3173"
            },
            {
              "name": "20081123 Revised: OpenSSH security advisory: cbc.adv",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/498579/100/0/threaded"
            },
            {
              "name": "openssh-sshtectia-cbc-info-disclosure(46620)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46620"
            },
            {
              "name": "32740",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32740"
            },
            {
              "name": "ADV-2009-1135",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1135"
            },
            {
              "name": "32760",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32760"
            },
            {
              "name": "ADV-2009-3184",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3184"
            },
            {
              "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705",
              "refsource": "CONFIRM",
              "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
            },
            {
              "name": "1021236",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1021236"
            },
            {
              "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10106",
              "refsource": "CONFIRM",
              "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10106"
            },
            {
              "name": "HPSBMA02447",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2"
            },
            {
              "name": "http://isc.sans.org/diary.html?storyid=5366",
              "refsource": "MISC",
              "url": "http://isc.sans.org/diary.html?storyid=5366"
            },
            {
              "name": "APPLE-SA-2009-11-09-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
            },
            {
              "name": "SSRT090062",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2"
            },
            {
              "name": "ADV-2008-3409",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/3409"
            },
            {
              "name": "ADV-2008-3172",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/3172"
            },
            {
              "name": "oval:org.mitre.oval:def:11279",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279"
            },
            {
              "name": "20081121 OpenSSH security advisory: cbc.adv",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/498558/100/0/threaded"
            },
            {
              "name": "http://support.apple.com/kb/HT3937",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT3937"
            },
            {
              "name": "VU#958563",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/958563"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-5161",
    "datePublished": "2008-11-19T17:00:00",
    "dateReserved": "2008-11-19T00:00:00",
    "dateUpdated": "2024-08-07T10:40:17.282Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openbsd:openssh:4.7p1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B042083-6D26-4A91-B3F6-E6D46266FF60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6693DC2D-CDA1-4E37-9569-58874F55A48A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16CDE975-9E08-493B-9385-3EC2CABC4A15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A63EA6B-2400-48C4-924D-3509971CCBEE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0658F08E-2596-4D8E-91AA-44A9DBE8F151\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74169893-A34F-49FB-8C83-36C4AA808925\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"013E94CC-AF68-44D0-826F-28B1825A8DA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9981E30-0D54-4464-8287-E450E7E8F770\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4ED17577-F56D-48DF-8863-B4FF039C47D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B74A91E2-C93E-49F4-B349-8E4CEC285C03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3.1j:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBF7244A-BFF7-4C7C-82FF-6B53236DB86D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BADA4CC-FC94-427A-AF93-9AAFDAADDB91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3.2j:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1356E837-2CF3-4AF9-80DD-FA2A97B3B2F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F1D6B7F-8B52-42C0-8613-740CACFB3463\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5024EC6-2A47-4ACE-A661-B78D314C7D0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA64A6E8-0EB7-4BCA-A7AA-245A466C2F22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5058DC44-835D-4BD9-B550-E5CB22F6475F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23ED4911-6CF5-4562-B421-A328D7BE0291\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3.8k:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7F3388A-39FA-4A3A-819A-764A16AAEB54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.3.9k:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C90B0480-C558-41BD-A16C-AD63DA1C09C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81DDF3D8-35EA-4677-B1AC-1CA674EEBCD3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F37366E9-F1B6-4458-AE1C-790405AC8740\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C727829-5E3A-41F6-BAB3-01AED39674D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CF57477-FB53-49CC-BAD4-CDC0FD9363F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65FB72FC-37EE-4D42-893E-9C0924EEA2E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.4.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D863ED8D-2B63-4497-B250-6AFA29D6D9D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.4.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2BF5D4C-DFF8-4094-82A6-A1302169CD43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.4.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5C5413C-47F1-4E3B-B618-2AECECA780FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.4.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"490A294D-AB7C-45C2-B887-1C3D2992AD91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.4.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43712853-9002-4778-9036-754262880B3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:4.4.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41A83090-D05D-40DD-AA29-F032CC165A9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5BCE145-44F4-4FED-8936-3AEBF8B38357\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.0.0f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"888C2DE3-2874-4310-9584-3AC96A82C306\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB6587AA-E91D-4194-81D0-FCF1AA382CAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.0.1f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"237D84A0-3FC3-4CFD-9454-ACD9E42DCC4C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6B2C7F5-8182-48B8-AA8A-C0F45978D3D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.0.2f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5EAC7A0-CD7D-4AE9-8421-9CDFFD073B5C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17855D5D-BDF5-48D3-9D71-694A3D41A826\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.0.3f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3915E4A8-6CCF-44A3-85B9-70651137C084\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A5DEDB4-7E16-4356-B080-09BCDA68772F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC9DBDC7-DDF0-4596-84BC-E4E05F47F938\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36FA61F9-CE29-47B0-AF2A-B1045A59018E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B338837-6346-48FC-A4D7-011EC20ACF61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8644D458-786D-4310-BAA8-40B2E27EA966\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4746C2E-91B1-4341-9CCD-78191BDF9A28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F3FCC3E-F3D5-4F90-B64F-85576E8B776B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17672CBB-A79F-4B91-9B01-193F960A4611\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"177E5CE0-A518-447F-9397-FC527E367077\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C808743-BFAF-4BB4-B0F0-13DF2C7D5531\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB90715C-E50C-4682-8C94-DE5CBCAA9965\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A8F8009-3586-4989-B180-2F46503DA59B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"44DDAAA8-185D-47FE-8434-E2FC000BD926\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2E5D670-FB1F-4560-A5A0-149FB4FCD2CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49A0662D-9356-4DC9-8082-58DBEE5C65FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E858413-3408-4A77-B56D-5016959FC690\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:5.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFFB475D-7996-48B3-8886-9000C6230414\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:6.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E56BFE1-044A-45AC-BF9C-C0CFBD2F8C7E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:6.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E72BBCB-636C-4939-90B7-308223E433EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:6.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5884968-F218-4CD4-AD4B-4C0CD26EF674\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:6.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56FD197E-27E9-4AF4-8A84-E1D0A7FD14DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_client:6.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DCD63A2-B666-4F5E-9D17-ED38B0BF973C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63E32B6A-AF41-4AEA-B55B-52B821106D00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0BC18FBF-1C2E-4D2F-9D3C-C6578CCBDB50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0824B78E-EB43-4D74-9062-79D0F273B06E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A76B02F-C2C8-4A35-A60A-EC74F43B8895\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8CD470B-274F-421C-AD4D-6D076935D741\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C30FE48E-857E-441C-B497-B6E541D2913F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A813EED-25AC-4191-92E8-58C1BC7D1E5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8719CEF9-6753-495B-9ACB-9E323CB7BCDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"553D3277-1B91-4998-A610-7E5D3E2C1413\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17886B3D-394C-4C94-93B2-FAB23B45C880\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7584F9C5-41E9-4F84-9849-B5D604BB55A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.4.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00008DAA-F66D-484B-941B-944F3E684981\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.4.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EEF4DE0B-ED77-49CE-AE0C-2AF2AE35FB78\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.4.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38EF9A76-6D83-4C99-A1DE-DC7E5AF28731\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:4.4.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C13F8DE-007E-467E-9872-9C4A951F1EE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"698824F0-DDFA-4469-8D42-59A56ACD6B5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30A3B9E9-3643-443B-A19A-2AE989832C50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F86A43A5-0906-405E-B3D0-250DA24A9093\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3126AFB2-A043-4C51-8402-D36D2F62AA73\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B00D37C5-5C79-46F9-97B7-555E48C53796\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55A817B6-CD13-4E0A-99DD-C5C39DF04C8E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C6F7054-6EDF-4F25-945E-E24F00A4A2B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16BEBCBF-8826-4451-9B6B-802BD8A4FA99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59F1EE63-6CF7-440D-BC5B-23D721996275\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C446EEE-3D06-485D-A031-2DA2A6501712\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F90B0C0-1CA9-47F8-B603-D6C15CF33352\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7292ADB-5D2C-4569-93B5-76125D71E3AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2810AD0C-4C6F-4B07-8D72-2D640219AE82\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06C3FAFB-90D2-4C6D-A210-27297926433E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connector:5.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78E26C82-CA31-4EBB-9635-D895B04D90E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connectsecure:6.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"170C4ADE-68C7-4F73-BD64-800D8E07F5E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connectsecure:6.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FB022A4-BFF0-4154-A8B6-C38B6C09A1BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connectsecure:6.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"026CCB02-C710-4AEA-B002-852AD4A3DCDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connectsecure:6.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02ACCEFF-1301-4118-BFCA-877F7A1D84B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_connectsecure:6.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"625EE79F-33C9-4272-A37C-F82921950EA2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E4480D2-1B5C-443D-8D7F-976885C33BDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"795DEA94-79D6-4132-B205-AB098E92216A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD05A3E8-105D-4712-8BBE-2D5CF4F78890\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D6691FF-77F2-4AE3-B49F-BFB8744AD046\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E58648AC-7288-46EC-B2BB-0805626BA31C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F8A31AD-D2E8-45DC-BF80-BD102B1FBC83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62FBDA08-566F-4D21-8186-4A287FD2F107\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B1DB64D-028A-422F-B106-873A45789A89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12509D69-71AF-48AF-986F-04A7E248011A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"075B6E8D-4C4B-4E98-94C6-52B842BE65FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEDF9DB2-6C3D-4BF5-BF55-818C3932CF93\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27B99F6E-712C-4205-9185-26F543EFC881\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F31FAA8F-EE03-4A7F-B0DE-BB4CE998FEB8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AF0262B-1451-40CA-9DD1-F2DEA793BD61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C27E0224-9431-49EF-8B32-850CDF6FFFE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88A88A21-7427-4452-8C2A-6C31542FA83C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3DCEAA0-509A-4978-BE53-0CBE084366FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3203DC73-05F2-4A28-9E62-3D87B482586A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BDA1AAC-3FCF-47D8-A6B4-9DB0D776CE14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64F4CDF1-695A-4677-A829-74BB365BF4FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BBEF55DD-FC87-42A3-9DAF-9862AA9649CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61188360-C55E-47AD-8C3E-043689249DA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A5BCE08-8940-4658-A4D7-5CAD33D3751C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC0FA974-7671-4FB7-BB36-274B5970EBAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"011F841A-4F1B-49B2-B379-9FE126141568\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3C54819-CF51-4BBE-873F-4A0E2072D10F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"743C5472-860C-48A6-AED7-BB00B6E91440\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2094ACB3-635A-437D-AF0E-4BFEB496EDF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40BE9A01-DEE5-4CD4-8C01-6689707A47EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2838C7E9-F247-491B-AAD1-680927044C24\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EAB99E2A-AF4D-4436-9C4F-EB043F8D16A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:4.4.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86E5680C-2E57-4BFA-9D60-B560BA819039\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83D8769C-E438-4805-955A-4EA7A274F036\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B2E96C8-F8F8-4002-B242-3ADDF1E84B7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2ADC814-3F33-47F6-AE27-7233F5D337AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B56052F-6768-41D6-9E91-F1377EB4E122\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9803DD4B-C48D-45EA-8154-C1C626DBDED2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"702A52AE-4E48-4138-8856-9EBE5A8DA964\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.1.1:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"B8C108AB-0C7C-4B58-8B54-C92C95A6B65D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"509B3B08-533C-46CE-B53F-5A2BFC553C53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0F992DB-F70C-4473-8C33-B5F59BD83A57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84D8E570-70B9-42CF-9764-238AAF6B380F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.2.0:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"9E582465-CC4A-4827-8C1F-548F01D6FCF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.2.1:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"60515678-F93E-46CC-94EF-0EF9B2091D76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4054251B-98C7-4AC9-B610-BA0EB250972C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.2.2:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"5B4AC671-C67D-46EC-9FB2-720F0DC3D4EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A93E9C5-91A4-4FC1-871B-ECE0E0FAFAA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"958F4FB0-C7DA-48D8-9500-A4A43ED807E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D772EE8-FB18-4431-89D8-FAF42797A2DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.3.0:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"A3A30FB0-35AB-4CF2-B74D-68015044770B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75DA0AC9-E2BF-40C7-B970-43D0283FCC6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA26CDDC-24FD-4FFD-BA5E-79F55BC8DA00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1003EDA5-E22E-4A4E-A289-660E823EE71F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"844003FE-63E9-4E2F-83E6-02798B753FB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7ED73DCC-6501-4DA8-B0C0-45F1A6E97BF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"711A3119-3390-48A9-8579-1D768D66386D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"798BE0FE-52F1-4283-8A0D-3E769A3752C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F77CD27-4E7E-4B4A-9363-FC87B611338A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.4.0:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"09B1AFF1-4F5D-42F0-A3A7-91BB9854B561\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.4.1:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"01872E42-E249-48AB-9259-FF3B0F3CAA4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.4.2:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"B73B06FD-3452-4900-AE09-44172A1EF174\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.5.0:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"DC126AA4-30B6-429B-A981-E4F0BCE03DE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:5.5.1:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"1932FFE5-DC06-4560-ADA7-4C993B8A880D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:6.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67BA8F3E-57F3-4388-8CD0-431AAA8DDB36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:6.0.0:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"2BDEED3F-3936-429C-957E-9E3EE455445C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:6.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71C39323-60AF-4CB5-BA5A-1F45353614F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:6.0.1:*:ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"3FE3D768-A3CF-422A-9EE2-6256E3ADDBEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:6.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D8E4B95-A551-4839-995F-5667CD215540\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:6.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B474CD5-DEC0-49DB-992D-658A3C573982\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:6.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB98ADBD-7FBB-4495-A71B-8EF9A6EAC33B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_server:6.0.4:*:linux_ibm_zos:*:*:*:*:*\", \"matchCriteriaId\": \"356A4B29-4BE7-4D33-8B64-CECCA6C24FAF\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors.\"}, {\"lang\": \"es\", \"value\": \"Error en el manejo del protocolo SSH en (1) SSH Tectia Client y Server y Connector 4v.0 a la v4.4.11, v5.0 a la v5.2.4, y v5.3 a la v5.3.8; Client y Server y ConnectSecure v6.0 a la v6.0.4; Server para Linux sobre IBM System z v6.0.4; Server para IBM z/OS v5.5.1 y anteriores, v6.0.0, y v6.0.1; y Client v4.0-J a la v4.3.3-J y v4.0-K a la v4.3.10-K; y (2) OpenSSH v4.7p1 y posiblemente otras versiones, cuando usan un  algoritmo de bloque  cifrado en el modo Cipher Block Chaining (CBC), facilita a los atacantes remotos el conseguir cierta informaci\\u00f3n en texto plano desde cualquier bloque de texto cifrado de su elecci\\u00f3n en una sessi\\u00f3n SSH mediante vectores de ataque desconocidos.\"}]",
      "evaluatorComment": "http://securitytracker.com/alerts/2008/Nov/1021235.html\n\nCBC mode connections are affected",
      "evaluatorSolution": "With a valid username and password patches are available at the following link:\nhttps://downloads.ssh.com/",
      "id": "CVE-2008-5161",
      "lastModified": "2024-11-21T00:53:25.890",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:H/Au:N/C:P/I:N/A:N\", \"baseScore\": 2.6, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"HIGH\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 4.9, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2008-11-19T17:30:00.670",
      "references": "[{\"url\": \"http://isc.sans.org/diary.html?storyid=5366\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://openssh.org/txt/cbc.adv\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/49872\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/50035\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/50036\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2009-1287.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/32740\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/32760\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/32833\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/33121\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/33308\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/34857\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/36558\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://support.apple.com/kb/HT3937\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://support.attachmate.com/techdocs/2398.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/958563\", \"source\": \"cve@mitre.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/498558/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/498579/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/32319\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id?1021235\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id?1021236\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id?1021382\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.ssh.com/company/news/article/953/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/3172\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/3173\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/3409\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1135\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3184\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/46620\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10106\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://isc.sans.org/diary.html?storyid=5366\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://openssh.org/txt/cbc.adv\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/49872\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/50035\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/50036\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2009-1287.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/32740\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/32760\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/32833\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/33121\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/33308\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/34857\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/36558\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.apple.com/kb/HT3937\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.attachmate.com/techdocs/2398.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/958563\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/498558/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/498579/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/32319\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1021235\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1021236\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1021382\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ssh.com/company/news/article/953/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/3172\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/3173\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/3409\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1135\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3184\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/46620\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10106\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vendorComments": "[{\"organization\": \"Red Hat\", \"comment\": \"This issue was addressed for Red Hat Enterprise Linux 5 by\\nhttps://rhn.redhat.com/errata/RHSA-2009-1287.html\\n\\nAfter reviewing the upstream fix for this issue, Red Hat does not intend to address this flaw in Red Hat Enterprise Linux 3 or 4 at this time.\", \"lastModified\": \"2009-09-02T00:00:00\"}]",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2008-5161\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-11-19T17:30:00.670\",\"lastModified\":\"2024-11-21T00:53:25.890\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors.\"},{\"lang\":\"es\",\"value\":\"Error en el manejo del protocolo SSH en (1) SSH Tectia Client y Server y Connector 4v.0 a la v4.4.11, v5.0 a la v5.2.4, y v5.3 a la v5.3.8; Client y Server y ConnectSecure v6.0 a la v6.0.4; Server para Linux sobre IBM System z v6.0.4; Server para IBM z/OS v5.5.1 y anteriores, v6.0.0, y v6.0.1; y Client v4.0-J a la v4.3.3-J y v4.0-K a la v4.3.10-K; y (2) OpenSSH v4.7p1 y posiblemente otras versiones, cuando usan un  algoritmo de bloque  cifrado en el modo Cipher Block Chaining (CBC), facilita a los atacantes remotos el conseguir cierta informaci\u00f3n en texto plano desde cualquier bloque de texto cifrado de su elecci\u00f3n en una sessi\u00f3n SSH mediante vectores de ataque desconocidos.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:N/A:N\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:4.7p1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B042083-6D26-4A91-B3F6-E6D46266FF60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6693DC2D-CDA1-4E37-9569-58874F55A48A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16CDE975-9E08-493B-9385-3EC2CABC4A15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A63EA6B-2400-48C4-924D-3509971CCBEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0658F08E-2596-4D8E-91AA-44A9DBE8F151\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74169893-A34F-49FB-8C83-36C4AA808925\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"013E94CC-AF68-44D0-826F-28B1825A8DA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9981E30-0D54-4464-8287-E450E7E8F770\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ED17577-F56D-48DF-8863-B4FF039C47D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B74A91E2-C93E-49F4-B349-8E4CEC285C03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3.1j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBF7244A-BFF7-4C7C-82FF-6B53236DB86D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BADA4CC-FC94-427A-AF93-9AAFDAADDB91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3.2j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1356E837-2CF3-4AF9-80DD-FA2A97B3B2F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F1D6B7F-8B52-42C0-8613-740CACFB3463\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5024EC6-2A47-4ACE-A661-B78D314C7D0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA64A6E8-0EB7-4BCA-A7AA-245A466C2F22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5058DC44-835D-4BD9-B550-E5CB22F6475F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23ED4911-6CF5-4562-B421-A328D7BE0291\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3.8k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7F3388A-39FA-4A3A-819A-764A16AAEB54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.3.9k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C90B0480-C558-41BD-A16C-AD63DA1C09C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81DDF3D8-35EA-4677-B1AC-1CA674EEBCD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F37366E9-F1B6-4458-AE1C-790405AC8740\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C727829-5E3A-41F6-BAB3-01AED39674D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CF57477-FB53-49CC-BAD4-CDC0FD9363F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65FB72FC-37EE-4D42-893E-9C0924EEA2E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D863ED8D-2B63-4497-B250-6AFA29D6D9D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2BF5D4C-DFF8-4094-82A6-A1302169CD43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5C5413C-47F1-4E3B-B618-2AECECA780FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"490A294D-AB7C-45C2-B887-1C3D2992AD91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43712853-9002-4778-9036-754262880B3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:4.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41A83090-D05D-40DD-AA29-F032CC165A9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5BCE145-44F4-4FED-8936-3AEBF8B38357\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.0.0f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"888C2DE3-2874-4310-9584-3AC96A82C306\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB6587AA-E91D-4194-81D0-FCF1AA382CAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.0.1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"237D84A0-3FC3-4CFD-9454-ACD9E42DCC4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6B2C7F5-8182-48B8-AA8A-C0F45978D3D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.0.2f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5EAC7A0-CD7D-4AE9-8421-9CDFFD073B5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17855D5D-BDF5-48D3-9D71-694A3D41A826\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.0.3f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3915E4A8-6CCF-44A3-85B9-70651137C084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A5DEDB4-7E16-4356-B080-09BCDA68772F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC9DBDC7-DDF0-4596-84BC-E4E05F47F938\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36FA61F9-CE29-47B0-AF2A-B1045A59018E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B338837-6346-48FC-A4D7-011EC20ACF61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8644D458-786D-4310-BAA8-40B2E27EA966\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4746C2E-91B1-4341-9CCD-78191BDF9A28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F3FCC3E-F3D5-4F90-B64F-85576E8B776B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17672CBB-A79F-4B91-9B01-193F960A4611\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"177E5CE0-A518-447F-9397-FC527E367077\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C808743-BFAF-4BB4-B0F0-13DF2C7D5531\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB90715C-E50C-4682-8C94-DE5CBCAA9965\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A8F8009-3586-4989-B180-2F46503DA59B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44DDAAA8-185D-47FE-8434-E2FC000BD926\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2E5D670-FB1F-4560-A5A0-149FB4FCD2CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49A0662D-9356-4DC9-8082-58DBEE5C65FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E858413-3408-4A77-B56D-5016959FC690\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:5.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFFB475D-7996-48B3-8886-9000C6230414\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E56BFE1-044A-45AC-BF9C-C0CFBD2F8C7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E72BBCB-636C-4939-90B7-308223E433EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5884968-F218-4CD4-AD4B-4C0CD26EF674\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56FD197E-27E9-4AF4-8A84-E1D0A7FD14DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_client:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DCD63A2-B666-4F5E-9D17-ED38B0BF973C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63E32B6A-AF41-4AEA-B55B-52B821106D00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BC18FBF-1C2E-4D2F-9D3C-C6578CCBDB50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0824B78E-EB43-4D74-9062-79D0F273B06E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A76B02F-C2C8-4A35-A60A-EC74F43B8895\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8CD470B-274F-421C-AD4D-6D076935D741\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C30FE48E-857E-441C-B497-B6E541D2913F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A813EED-25AC-4191-92E8-58C1BC7D1E5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8719CEF9-6753-495B-9ACB-9E323CB7BCDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"553D3277-1B91-4998-A610-7E5D3E2C1413\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17886B3D-394C-4C94-93B2-FAB23B45C880\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7584F9C5-41E9-4F84-9849-B5D604BB55A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00008DAA-F66D-484B-941B-944F3E684981\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEF4DE0B-ED77-49CE-AE0C-2AF2AE35FB78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38EF9A76-6D83-4C99-A1DE-DC7E5AF28731\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:4.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C13F8DE-007E-467E-9872-9C4A951F1EE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"698824F0-DDFA-4469-8D42-59A56ACD6B5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30A3B9E9-3643-443B-A19A-2AE989832C50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F86A43A5-0906-405E-B3D0-250DA24A9093\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3126AFB2-A043-4C51-8402-D36D2F62AA73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B00D37C5-5C79-46F9-97B7-555E48C53796\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55A817B6-CD13-4E0A-99DD-C5C39DF04C8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C6F7054-6EDF-4F25-945E-E24F00A4A2B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16BEBCBF-8826-4451-9B6B-802BD8A4FA99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59F1EE63-6CF7-440D-BC5B-23D721996275\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C446EEE-3D06-485D-A031-2DA2A6501712\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F90B0C0-1CA9-47F8-B603-D6C15CF33352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7292ADB-5D2C-4569-93B5-76125D71E3AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2810AD0C-4C6F-4B07-8D72-2D640219AE82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06C3FAFB-90D2-4C6D-A210-27297926433E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connector:5.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78E26C82-CA31-4EBB-9635-D895B04D90E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connectsecure:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"170C4ADE-68C7-4F73-BD64-800D8E07F5E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connectsecure:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FB022A4-BFF0-4154-A8B6-C38B6C09A1BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connectsecure:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"026CCB02-C710-4AEA-B002-852AD4A3DCDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connectsecure:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02ACCEFF-1301-4118-BFCA-877F7A1D84B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_connectsecure:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"625EE79F-33C9-4272-A37C-F82921950EA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E4480D2-1B5C-443D-8D7F-976885C33BDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"795DEA94-79D6-4132-B205-AB098E92216A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD05A3E8-105D-4712-8BBE-2D5CF4F78890\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D6691FF-77F2-4AE3-B49F-BFB8744AD046\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E58648AC-7288-46EC-B2BB-0805626BA31C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F8A31AD-D2E8-45DC-BF80-BD102B1FBC83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62FBDA08-566F-4D21-8186-4A287FD2F107\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B1DB64D-028A-422F-B106-873A45789A89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12509D69-71AF-48AF-986F-04A7E248011A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"075B6E8D-4C4B-4E98-94C6-52B842BE65FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEDF9DB2-6C3D-4BF5-BF55-818C3932CF93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27B99F6E-712C-4205-9185-26F543EFC881\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F31FAA8F-EE03-4A7F-B0DE-BB4CE998FEB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AF0262B-1451-40CA-9DD1-F2DEA793BD61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C27E0224-9431-49EF-8B32-850CDF6FFFE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88A88A21-7427-4452-8C2A-6C31542FA83C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3DCEAA0-509A-4978-BE53-0CBE084366FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3203DC73-05F2-4A28-9E62-3D87B482586A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BDA1AAC-3FCF-47D8-A6B4-9DB0D776CE14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64F4CDF1-695A-4677-A829-74BB365BF4FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBEF55DD-FC87-42A3-9DAF-9862AA9649CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61188360-C55E-47AD-8C3E-043689249DA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A5BCE08-8940-4658-A4D7-5CAD33D3751C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC0FA974-7671-4FB7-BB36-274B5970EBAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"011F841A-4F1B-49B2-B379-9FE126141568\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3C54819-CF51-4BBE-873F-4A0E2072D10F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"743C5472-860C-48A6-AED7-BB00B6E91440\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2094ACB3-635A-437D-AF0E-4BFEB496EDF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40BE9A01-DEE5-4CD4-8C01-6689707A47EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2838C7E9-F247-491B-AAD1-680927044C24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAB99E2A-AF4D-4436-9C4F-EB043F8D16A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:4.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E5680C-2E57-4BFA-9D60-B560BA819039\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83D8769C-E438-4805-955A-4EA7A274F036\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B2E96C8-F8F8-4002-B242-3ADDF1E84B7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2ADC814-3F33-47F6-AE27-7233F5D337AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B56052F-6768-41D6-9E91-F1377EB4E122\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9803DD4B-C48D-45EA-8154-C1C626DBDED2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"702A52AE-4E48-4138-8856-9EBE5A8DA964\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.1.1:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"B8C108AB-0C7C-4B58-8B54-C92C95A6B65D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"509B3B08-533C-46CE-B53F-5A2BFC553C53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0F992DB-F70C-4473-8C33-B5F59BD83A57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84D8E570-70B9-42CF-9764-238AAF6B380F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.2.0:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"9E582465-CC4A-4827-8C1F-548F01D6FCF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.2.1:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"60515678-F93E-46CC-94EF-0EF9B2091D76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4054251B-98C7-4AC9-B610-BA0EB250972C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.2.2:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"5B4AC671-C67D-46EC-9FB2-720F0DC3D4EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A93E9C5-91A4-4FC1-871B-ECE0E0FAFAA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"958F4FB0-C7DA-48D8-9500-A4A43ED807E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D772EE8-FB18-4431-89D8-FAF42797A2DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.3.0:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"A3A30FB0-35AB-4CF2-B74D-68015044770B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75DA0AC9-E2BF-40C7-B970-43D0283FCC6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA26CDDC-24FD-4FFD-BA5E-79F55BC8DA00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1003EDA5-E22E-4A4E-A289-660E823EE71F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"844003FE-63E9-4E2F-83E6-02798B753FB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ED73DCC-6501-4DA8-B0C0-45F1A6E97BF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"711A3119-3390-48A9-8579-1D768D66386D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"798BE0FE-52F1-4283-8A0D-3E769A3752C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F77CD27-4E7E-4B4A-9363-FC87B611338A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.4.0:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"09B1AFF1-4F5D-42F0-A3A7-91BB9854B561\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.4.1:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"01872E42-E249-48AB-9259-FF3B0F3CAA4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.4.2:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"B73B06FD-3452-4900-AE09-44172A1EF174\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.5.0:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"DC126AA4-30B6-429B-A981-E4F0BCE03DE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:5.5.1:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"1932FFE5-DC06-4560-ADA7-4C993B8A880D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67BA8F3E-57F3-4388-8CD0-431AAA8DDB36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:6.0.0:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"2BDEED3F-3936-429C-957E-9E3EE455445C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71C39323-60AF-4CB5-BA5A-1F45353614F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:6.0.1:*:ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"3FE3D768-A3CF-422A-9EE2-6256E3ADDBEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D8E4B95-A551-4839-995F-5667CD215540\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B474CD5-DEC0-49DB-992D-658A3C573982\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB98ADBD-7FBB-4495-A71B-8EF9A6EAC33B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_server:6.0.4:*:linux_ibm_zos:*:*:*:*:*\",\"matchCriteriaId\":\"356A4B29-4BE7-4D33-8B64-CECCA6C24FAF\"}]}]}],\"references\":[{\"url\":\"http://isc.sans.org/diary.html?storyid=5366\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://openssh.org/txt/cbc.adv\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/49872\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/50035\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/50036\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2009-1287.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/32740\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32760\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32833\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/33121\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/33308\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/34857\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/36558\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.apple.com/kb/HT3937\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.attachmate.com/techdocs/2398.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/958563\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/498558/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/498579/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/32319\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1021235\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1021236\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1021382\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ssh.com/company/news/article/953/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/3172\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/3173\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/3409\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1135\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3184\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/46620\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10106\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://isc.sans.org/diary.html?storyid=5366\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://openssh.org/txt/cbc.adv\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/49872\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/50035\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/50036\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2009-1287.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32740\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32760\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32833\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/33121\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/33308\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/34857\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36558\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-247186-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT3937\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.attachmate.com/techdocs/2398.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-503.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/958563\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/CPNI957037.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/498558/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/498579/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/32319\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1021235\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1021236\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1021382\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ssh.com/company/news/article/953/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/3172\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/3173\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/3409\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1135\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3184\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/46620\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10106\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10163\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11279\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorComment\":\"http://securitytracker.com/alerts/2008/Nov/1021235.html\\n\\nCBC mode connections are affected\",\"evaluatorSolution\":\"With a valid username and password patches are available at the following link:\\nhttps://downloads.ssh.com/\",\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"This issue was addressed for Red Hat Enterprise Linux 5 by\\nhttps://rhn.redhat.com/errata/RHSA-2009-1287.html\\n\\nAfter reviewing the upstream fix for this issue, Red Hat does not intend to address this flaw in Red Hat Enterprise Linux 3 or 4 at this time.\",\"lastModified\":\"2009-09-02T00:00:00\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.