Synopsis
The remote host is vulnerable to a flaw that allows attackers to retrieve sensitive files or data.
Description
The remote host is running a version of OpenSSH which is vulnerable to a flaw in the way that it handles GSSAPI authentication. Specifically, if GSSAPI is enabled and 'GSSAPIDelegateCredentials' is enabled, an attacker may gain access to GSSAPI credentials.
Note: NNM has solely relied on the banner of the SSH client to perform this check. Any backported patches or workarounds such as recompiling or edited configurations are not observable through the banner.
Solution
Upgrade to version 4.2p1 or higher.
Plugin Details
Risk Information
Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:N/A:N
Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
Vulnerability Information
CPE: cpe:/a:openbsd:openssh