[ale] OpenSSH root vulnerability

Glenn C. Lasher Jr. glasher at nycap.rr.com
Sun Mar 10 11:24:48 EST 2002



Thanks for posting this.  I saw it on /. also, but I didn't think to act
on it when I saw it.  I have now upgraded all of my machines to 3.1.

Thanks again.

On Thu, 7 Mar 2002, Transam wrote:

> Recent versions of OpenSSH -- including the newest -- have a just reported
> vulnerability that allow local users to make themselves root.  If one uses
> OpenSSH to connect into a malevolent or compromised SSH server then root
> access to the client system can be gained as well.  The possibility of
> a remote root vulnerability on any OpenSSH server system has not been
> ruled out.
>
> If you are not sure what version of SSH you are using and you are running
> on the server side, just do
>
>      telnet yourself.com 22
>
> If you see
>
>      SSH-1.99-OpenSSH_2.9p2
>
> or anything similar that includes "OpenSSH" then you are in danger.
>
> On the client side you can do
>
>      ssh -V
>
> Either of these techniques also are supported for the non-Open version too.
>
> Consider using /etc/hosts.allow or IP Chains or IP Tables to limit
> access to your SSH server  to trusted systems or simply turn off the
> server if not needed.  Frankly, the Open version of SSH has suffered
> a lot of serious security vulnerabilities in the past 18 months or so
> and I must recommend against it in favor of the commercial version at
> http://www.ssh.com.  Note that this latter version is free on Linux and
> they were the people who created SSH.  They also have a nifty GUI-based
> Windows and Mac client that I am told is rather nice and only USD 99.
>
> This problem has been patched in OpenSSH 3.1, which has been released
> today (March 7, 2002).  It appears that neither Red Hat nor Slackware
> have yet integrated this patch into their trees.
>
>
> * Flaw weakens Linux security software
> March 1st, 2002
>
> Programmers have found a vulnerability in Linux that could allow
> protective firewall software to grant malicious computer users access to
> protected networks. The flaw, which affects versions 2.4.14 through
> 2.4.18-pre9 of the Linux kernel, is in a component of the Netfilter
> firewall software.
>
> http://www.linuxsecurity.com/articles/firewalls_article-4527.html
>
>
> A Datamation Magazine survey of IT execs & SysAdmins picks the best
> software and hardware.  This mag is not specific to any platform or
> hardware.  The best product of 2001 was RH 7.2 as a Desktop.  No
> Microsoft product even made the list.  Point this out to your higher
> ups and associates:
>
> http://Security.ITtoolbox.com/browse.asp?c=SecurityNews&r=/news/dispnews.asp?i=65198
>
>
> Bob Toxen
> transam at cavu.com                       [Bob's ALE Bulk email]
> bob at cavu.com                           [Please use for email to me]
> http://www.cavu.com                    [Network&Linux/Unix security consulting]
> http://www.realworldlinuxsecurity.com/ [My 5* book:"Real World Linux Security"]
> http://www.cavu.com/sunset.html        [Sunset Computer]
>
> ---
> This message has been sent through the ALE general discussion list.
> See http://www.ale.org/mailing-lists.shtml for more info. Problems should be
> sent to listmaster at ale dot org.
>

glasher at nycap.rr.com
You've been programmed by the Illuminati not to see the word "".


---
This message has been sent through the ALE general discussion list.
See http://www.ale.org/mailing-lists.shtml for more info. Problems should be 
sent to listmaster at ale dot org.






More information about the Ale mailing list