Rapid7 Vulnerability & Exploit Database

OpenSSH "known_hosts" File Information Disclosure

Back to Search

OpenSSH "known_hosts" File Information Disclosure

Severity
1
CVSS
(AV:L/AC:H/Au:N/C:P/I:N/A:N)
Published
08/23/2005
Created
07/25/2018
Added
05/28/2009
Modified
08/28/2019

Description

SSH, as implemented in OpenSSH before 4.0 and possibly other implementations, stores hostnames, IP addresses, and keys in plaintext in the known_hosts file, which makes it easier for an attacker that has compromised an SSH user's account to generate a list of additional targets that are more likely to have the same password or key.

Solution(s)

  • openbsd-openssh-upgrade-4_0

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;