SSH Communications Security Tectia Connector 4.4.10

CPE Details

SSH Communications Security Tectia Connector 4.4.10
4.4.10
2008-11-19
18h03 +00:00
2008-11-19
18h03 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:ssh:tectia_connector:4.4.10:*:*:*:*:*:*:*

Informations

Vendor

ssh

Product

tectia_connector

Version

4.4.10

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2008-5161 2008-11-19 16h00 +00:00 Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors.
2.6
CVE-2006-5484 2006-10-24 20h00 +00:00 SSH Tectia Client/Server/Connector 5.1.0 and earlier, Manager 2.2.0 and earlier, and other products, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents Tectia from correctly verifying X.509 and other certificates that use PKCS #1, a similar issue to CVE-2006-4339.
5