Re: SSL Buffer Overflow Vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thursday 27 May 2004 18:02, Chalonec Roger wrote:
> I performed the check and am running openssh-3.6.1p2-19.  Part of their
> report showed:
> 
> -------------------------------------------------------------
> SSH Servers: TCP:22 - OpenSSH 3.7.0 Buffer Overflow
> Risk Level: High 
> Description: OpenSSH versions prior to 3.7.1 are vulnerable to buffer
> management errors.
> How To Fix: 
> Upgrade to 3.7.1 or the latest build immediately.
> URL1: OpenSSH Advisory  (http://www.openssh.com/txt/buffer.adv)
> CVE: CAN-2003-0695 
> ------------------------------------------------------------------

[root@fc1 root]# rpm -q --changelog openssh | grep -2 'CAN-2003-0695'
* Wed Sep 17 2003 Bill Nottingham <notting@xxxxxxxxxx> 3.6.1p1-14

- additional buffer manipulation fixes (CAN-2003-0695)

* Wed Sep 17 2003 Daniel Walsh <dwalsh@xxxxxxxxxx> 3.6.1p2-13.sel

> 
> Another part showed:
> ----------------------------------------------------
> 22: SSH - SSH (Secure Shell) Remote Login Protocol
> Detected Protocol: SSH
> Port State: Open
> Version: SSH-1.99-OPENSSH_3.6.1P2
> ----------------------------------------------------
> 
> 
> This was Retina so I guess it was a false positive.  Sorry for the
> alarm.

    No problem, you're welcome :)

> 
> Thanks for your help,
> 
> Roger
> 
> 
>  3.7.0 and another showed 
> 
> -----Original Message-----
> From: Doncho N. Gunchev [mailto:mr700@xxxxxxxxxxxx] 
> Sent: Thursday, May 27, 2004 6:50 AM
> To: For users of Fedora Core releases
> Cc: Chalonec Roger
> Subject: Re: SSL Buffer Overflow Vulnerability
> 
> 
> On Thursday 27 May 2004 13:04, Chalonec Roger wrote:
> > Our security folks detected an openSSH vulnerability in a fully 
> > patched FC1.  They said that it was running version 3.7.0 and needed 
> > to go to
> 
>     It should not -> in FC1 it's 'rpm -q openssh' =
> 'openssh-3.6.1p2-19'!
> 
> > 3.7.1 .  Should this be the case if FC1 is fully patched?  Can anyone 
> > point me to directions on how to upgrade to 3.7.1 or recommend a 
> > better openSSH version?
> 
>     Better do 'rpm -q openssh --changelog | less' and see if this
> vulnerability is patched (you have to ask them exactly what
> vulnerability do they have in mind). Many programs report
> vulnerabilities based on the program version (not actual check), so I
> guess this is the case here. You can see openssh-3.7p1.tar.gz is from
> 16-Sep-2003 and in the changelog there are buffer overflow fixes from 17
> and 18 Sep-2003.
> 
> > 
> > Thanks,
> > 
> > Roger
> 
>     Check the list, RedHat backports all fixes from the new versions.
> This way you don't have all new features (and unknown bugs), but still
> have all fixes from the new versions (as someone from RedHat allready
> explained).
> 
> -- 
> Regards,
>   Doncho N. Gunchev    Registered Linux User #291323 at counter.li.org
>   GPG-Key-ID: 1024D/DA454F79
>   Key fingerprint = 684F 688B C508 C609 0371  5E0F A089 CB15 DA45 4F79
> 

-- 
Regards,
  Doncho N. Gunchev    Registered Linux User #291323 at counter.li.org
  GPG-Key-ID: 1024D/DA454F79
  Key fingerprint = 684F 688B C508 C609 0371  5E0F A089 CB15 DA45 4F79



[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux