LOW · 1.2

CVE-2005-2666

SSH, as implemented in OpenSSH before 4.0 and possibly other implementations, stores hostnames, IP addresses, and keys in plaintext in the known_hosts file, which makes it easier for an attacker that ...

Vulnerability Description

SSH, as implemented in OpenSSH before 4.0 and possibly other implementations, stores hostnames, IP addresses, and keys in plaintext in the known_hosts file, which makes it easier for an attacker that has compromised an SSH user's account to generate a list of additional targets that are more likely to have the same password or key.

CVSS Score

1.2

LOW

AV:L/AC:H/Au:N/C:P/I:N/A:N
Confidentiality
PARTIAL
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
OpenbsdOpenssh3.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2005-2666?

CVE-2005-2666 is a vulnerability with a CVSS score of 1.2 (LOW). SSH, as implemented in OpenSSH before 4.0 and possibly other implementations, stores hostnames, IP addresses, and keys in plaintext in the known_hosts file, which makes it easier for an attacker that ...

How severe is CVE-2005-2666?

CVE-2005-2666 has been rated LOW with a CVSS base score of 1.2/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2005-2666?

Check the references section above for vendor advisories and patch information. Affected products include: Openbsd Openssh.