04 Dec 2012
10 Dec 2012
SSH Tectia Server 6.x
This covers vulnerabilities or security issues where malicious users or people can bypass certain security mechanisms of the application.
The actual impact varies significantly depending on the design and purpose of the affected application.
Kingcope has reported a vulnerability in SSH Tectia Server, which can be exploited by malicious people to bypass certain security restrictions.
The vulnerability is caused due to an error in the SSH USERAUTH CHANGE REQUEST function when handling "old-style" password authentication. This can be exploited to reset the password of any user and bypass the authentication process.
The vulnerability is reported in versions 6.0.4 to 6.0.20, 6.1.0 to 6.1.12, 6.2.0 to 6.2.5, and 6.3.0 to 6.3.2 running on Unix/Linux platforms only.
Update to a fixed version.