Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0

From: Eugene Medynskiy (eugenemat_private)
Date: Wed Jul 25 2001 - 12:30:10 PDT

  • Next message: Knud Erik Hojgaard: "DCShop exploit - google reply"

    This only affects systems that use crypt() to validate passwords. If you 
    use md5 or blowfish instead (which OpenBSD, NetBSD, and Debian Linux, 
    among others do by default) you should not be vulnerable.
    
    -- 
    -- Eugene Medynskiy
    
    "You can't fight in here, this is the War Room!"
    
    Stephanie Thomas wrote:
    
    > Hi Emre,
    > 
    > We have tested OpenBSD and NetBSD, and have found
    > that they do not experience this vulnerability, 
    > even with ssh 3.0.0 installed.
    > 
    > This is most likely due to the method used to encrypt the 
    > password in /etc/passwd or /etc/shadow.
    > 
    > Best Regards,
    > 
    > Steph
    > 
    > -----Original Message-----
    > From: Emre Yildirim [mailto:emreat_private]
    > Sent: Monday, July 23, 2001 5:12 PM
    > To: bugtraqat_private
    > Cc: customer.serviceat_private
    > Subject: RE: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
    > 
    > 
    > 
    > 
    >>SSH Secure Shell 3.0.0 does not ship with any
    >>of the operating systems mentioned, nor does the
    >>announcement specify that it does. However, if a
    >>user has explicitly installed SSH Secure Shell 3.0.0
    >>on any of the listed operating systems, they are
    >>vulnerable to this potential exploit.
    >>
    >>
    > 
    > I don't want to drag this boring thread any longer, but in
    > your advisory, it stated that OpenBSD and NetBSD were
    > not vulnerable.  So...if I install SSH 3.0.0 on one of those
    > (even though the already come with openssh), ssh will not
    > be vulnerable to this bug?  Or will it?  I think that part
    > created a little confusion.
    > 
    > 
    > Cheers
    > 
    > 
    > 
    > 
    > 
    



    This archive was generated by hypermail 2b30 : Wed Jul 25 2001 - 11:40:22 PDT