Table of Contents

CVE 2010-4478

'OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.'

ClearCenter response

Short response

Not vulnerable.

Long response

This CVE does not affect any version of ClearOS that ever shipped.

Resolution

No action required.

search?q=clearos%2C%20clearos%20content%2C%20CVE%2C%20CVE2010%2C%20xcategory%2C%20maintainer_dloper%2C%20maintainerreview_x%2C%20keywordfix&btnI=lucky