Re: SSH 1.2.25/HP-UX 10.20 Vulnerability

From: Joao Miguel Neves (jnevesat_private)
Date: Thu Sep 10 1998 - 02:50:30 PDT

  • Next message: Razvan Dragomirescu: "Re: Buffer overflow in bash 1.14.7(1)"

    > However, if user connects via SSH using newly created username, no password
    > authentication is performed and user automatically drops into shell.
    >
    > This can be especially dangerous on systems where users are added on a
    > daily basis (universities for example) and other users aware of this bug
    > could gain access to newly created accounts (remote users could gain
    > information about new users using finger command, for example).
    >
    > FIXES:
    >
    > SSH 1.2.26 is available for over a month now (this problem has been fixed).
    > Also, version 2.0 of SSH is released (completely rewritten).
    >
    Is this fixed for all situations? For instance the Digital Unix C2 patch
    only worked when the authentication was with the password if you used any
    of the other authentication methods (RSA key, for instance) the limits
    aren't implemented. The person who did the patch already corrected it, but
    last week he had not sent this to be put on the major release.
    
                                                    Joao Miguel Neves
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:15:47 PDT