Applies to: Centrify-Openssh 6.7p1-5.2.3 or below on all platforms.
Question:
Is Centrify-Openssh impacted by CVE-2015-5600
involving "MaxAuthTries" limit is bypassed and increased the efficiency of the brute-force attack? If so has this vulnerability been addressed?
Answer:For information about CVE-2015-5600, please refer to:
This is a Openssh bug that affects local users ONLY, Active Directory users are protected by the account lockout policy. AD users account will be locked after the number of invalid login attempts reaches the lockout threshold value.
In order to protect the local users, account lockout can also be implemented by the following methods:
Solaris:https://blogs.oracle.com/gbrunett/entry/solaris_10_account_lockout_threeLinux: (Using pam_tally2)
http://wiki.centos.org/HowTos/OS_Protectionhttp://websistent.com/linux-password-lockout-policy/AIX:
http://www-01.ibm.com/support/docview.wss?uid=isg3T1020193OpenSSH 7.0 which addressed CVE-2015-5600 was released on August 12th,2015.
A new updated version of the Centrify compiled version of OpenSSH will be released in Centrify Suite 2016
.
(All external links are provided as a courtesy)