Re: SSH2 Exploit?

From: Dan Hanson (dhansonat_private)
Date: Thu Mar 07 2002 - 11:35:45 PST

  • Next message: Manuel Bouyer: "Re: Rumours about Apache 1.3.22 exploits -> analysis of so-called exploit client"

    Hmmm..not a exploit, but a vulnerability in OpenSSH up to 3.0.2 (3.1 has
    been released), there is an advisory that has been posted on Bugtraq and
    /.  Thought the part about exploitation without a user account may be
    possible was interesting.
    
    quoted and referenced:
    http://www.pine.nl/advisories/pine-cert-20020301.txt
    
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    -
    -----------------------------------------------------------------------------
     Pine Internet Security Advisory
    -
    -----------------------------------------------------------------------------
     Advisory ID       : PINE-CERT-20020301
     Authors           : Joost Pol <joostat_private>
    Issue date        : 2002-03-07
     Application       : OpenSSH
     Version(s)        : All versions between 2.0 and 3.0.2
     Platforms         : multiple
     Vendor informed   : 20020304
     Availability      : http://www.pine.nl/advisories/pine-cert-20020301.txt
    -
    -----------------------------------------------------------------------------
    
    Synopsis
    
            A bug exists in the channel code of OpenSSH versions 2.0 - 3.0.2
    
            Users with an existing user account can abuse this bug to
            gain root privileges. Exploitability without an existing
            user account has not been proven but is not considered
            impossible. A malicious ssh server could also use this bug
    	to exploit a connecting vulnerable client.
    
    Impact
    
            HIGH: Existing users will gain root privileges.
    
    Description
    
            Simple off by one error. Patch included.
    
    Solution
    
            The OpenSSH project will shortly release version 3.1.
    
    	Upgrading to this version is highly recommended.
    
    	This version will be made available at http://www.openssh.com
    
    	The FreeBSD port of OpenSSH has been updated to reflect the
    	patches as supplied in this document.
    
    	OpenSSH CVS has been updated, see
    
    	http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/ \
    	channels.c.diff?r1=1.170&r2=1.171
    
    	Or apply the attached patch as provided by PINE Internet:
    
    	http://www.pine.nl/advisories/pine-cert-20020301.patch
    
    
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.6 (FreeBSD)
    Comment: For info see http://www.gnupg.org
    
    iEYEARECAAYFAjyHaKkACgkQDNrSylhGGb3p2ACfXZu3WShzGT4Mp/LgwA6AZStu
    rtkAn3O83WzyNijdJ9+9OwLJxUcVj4Ld
    =j+Hz
    -----END PGP SIGNATURE-----
    
    
    
    --
    Dan Hanson
    SecurityFocus -- http://www.securityfocus.com
    ARIS -- http://aris.securityfocus.com
    dhansonat_private
    



    This archive was generated by hypermail 2b30 : Fri Mar 08 2002 - 02:39:02 PST