CVE 2010-4478
'OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.'
ClearCenter response
Short response
Not vulnerable.
Long response
This CVE does not affect any version of ClearOS that ever shipped.
Resolution
No action required.
Links
content/en_us/announcements_cve_cve-2010-4478.txt · Last modified: 2014/12/22 11:10 by dloper