vulnersCom / nmap-vulners

NSE script based on Vulners.com API
GNU General Public License v3.0
3.19k stars 542 forks source link

openssh false positive vulnerabilties. #44

Open kalkir opened 3 years ago

kalkir commented 3 years ago

we have recently noticed false positive vulnerabilities for openssh packages, we are using the latest openssh version 8.6

https://nvd.nist.gov/vuln/detail/CVE-2001-0554">CVE-2001-0554| MSF:ILITIES/OPENBSD-OPENSSH-CVE-2020-14145 MSF:ILITIES/HUAWEI-EULEROS-2_0_SP9-CVE-2020-14145 MSF:ILITIES/HUAWEI-EULEROS-2_0_SP8-CVE-2020-14145 MSF:ILITIES/HUAWEI-EULEROS-2_0_SP5-CVE-2020-14145 MSF:ILITIES/F5-BIG-IP-CVE-2020-14145 https://nvd.nist.gov/vuln/detail/CVE-2020-14145

can we skip these vulnerabilities?

Laisky commented 10 months ago

+1, a lot of false-positive reports

22/tcp open  ssh     OpenSSH 8.9p1 Ubuntu 3ubuntu0.4 (Ubuntu Linux; protocol 2.0)
| vulscan: VulDB - https://vuldb.com:
| No findings
|
| MITRE CVE - https://cve.mitre.org:
| [CVE-2010-4755] The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.\x0D
| [CVE-2007-4654] Unspecified vulnerability in SSHield 1.6.1 with OpenSSH 3.0.2p1 on Cisco WebNS 8.20.0.1 on Cisco Content Services Switch (CSS) series 11000 devices allows remote attackers to cause a denial of service (connection slot exhaustion and device crash) via a series of large packets designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144), possibly a related issue to CVE-2002-1024.\x0D
| [CVE-1999-0661] A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6.\x0D
tonymet commented 8 months ago

vulners is not reading debian (or other distro) security patches.

Vanilla openssh 8.4 has a vulnerability but Debian 1:8.4p1-5+deb11u2 Openssh package does not

Vulners should update the catalog with the Debian content.

e.g. CVE-2021-28041