Synopsis
The remote SSH server has a security bypass vulnerability.
Description
According to its banner, the version of F-Secure SSH running on the remote host allows a user to log in using a password, even though the server policy disallows it. An attacker could exploit this flaw to run a dictionary attack against the SSH server.
Solution
Upgrade to F-Secure SSH 3.1.0 build 9 or later.
Plugin Details
File Name: fsecure_ssh_pass_pol_evasion.nasl
Supported Sensors: Nessus
Vulnerability Information
CPE: cpe:/a:f-secure:f-secure_ssh_server
Exploit Ease: No known exploits are available
Reference Information
BID: 9824