JVN#01611135
        VxWorks SSH server (IPSSH) denial-of-service (DoS) vulnerability
              
      
      Overview
The SSH server (IPSSH) implementation in VxWorks contains a denial-of-service (DoS) vulnerability.
Products Affected
- VxWorks versions 6.5 through 6.9
Description
The SSH server (IPSSH) implementation in VxWorks contains a denial-of-service (DoS) vulnerability due to an issue in the processing directly after the SSH connection is established.
Impact
SSH access may become unavailable until the next reboot when receiving a specially crafted packet after a SSH connection is established.
Solution
Apply a patch
Apply the appropriate patch according to the information provided by the developer.
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2013.03.18
| Measures | Conditions | Severity | 
|---|---|---|
| Access Required | can be attacked over the Internet using packets | 
 | 
| Authentication | login caused to be created by an administrator | 
 | 
| User Interaction Required | the vulnerability can be exploited without an honest user taking any action | 
 | 
| Exploit Complexity | some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls) | 
 | 
Credit
Hisashi Kojima and Masahiro Nakada of Fujitsu Laboratories Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
| JPCERT Alert | |
| JPCERT Reports | |
| CERT Advisory |  | 
| CPNI Advisory |  | 
| TRnotes |  | 
| CVE | CVE-2013-0712 | 
| JVN iPedia | JVNDB-2013-000019 | 

