Revised OpenSSH Security Advisory (adv.token)

From: Markus Friedl (markusat_private)
Date: Fri Apr 26 2002 - 04:59:49 PDT

  • Next message: Andreas Sandblad: "Mp3 file can execute code in Winamp [Sandblad advisory #5]"

    This is the 2nd revision of the Advisory.
    
    Buffer overflow in OpenSSH's sshd if AFS has been configured on the
    system or if KerberosTgtPassing or AFSTokenPassing has been enabled
    in the sshd_config file.  Ticket and token passing is not enabled
    by default.
    
    1. Systems affected:
    
            All Versions of OpenSSH with AFS/Kerberos token passing
            compiled in and enabled (either in the system or in
            sshd_config) contain a buffer overflow.
    
            Token passing is disabled by default and only available in
            protocol version 1.
    
    2. Impact:
    
            Remote users can get privileged access for OpenSSH < 2.9.9
    
            Local users can get privileged access for OpenSSH < 3.2.1
    
            No privileged access is possible for OpenSSH with
    	UsePrivilegeSeparation enabled.
    
    3. Solution:
    
    	Apply the matching patch:
    
    	ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/openssh-3.1-adv.token.patch
    	ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-3.1p1-adv.token.patch
    	ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/024_sshafs.patch
    	ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/019_sshafs.patch
    	ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/001_sshafs.patch
    
    4. Credits:
    
    	Marcell Fodor <m.fodorat_private>
    
    EOF
    



    This archive was generated by hypermail 2b30 : Fri Apr 26 2002 - 06:49:11 PDT