A Bug in OpenSSH discovered that can leak secret cryptographic keys has just fixed in OpenSSH, one of the more widely used implementations of the secure shell (SSH) protocol. The Vulnerability allows attacker to sniff into network Man-in-the-Middle (MITM) and leak their secret Private cryptographic keys.
The vulnerability resides only in the version end users use to connect to servers and not in versions used by servers. A maliciously configured server could exploit it to obtain the contents of the connecting computer’s memory, including the private encryption key used for SSH connections. The bug is the result of code that enables an experimental roaming feature in OpenSSH versions 5.4 to 7.1
The attacker would have to control a malicious server in order to force the client to give up the key, OpenSSH and researchers at Qualys said in separate advisories. Qualys’ security team found the vulnerability Jan. 11 and the OpenSSH team had it patched within three days.