On Mon, Jun 24, 2002 at 03:14:39PM -0700, Mike Noyes wrote: > There is a problem with OpenSSH. > > [Fwd: [SECURITY] [DSA-134-1] OpenSSH remote vulnerability] > Theo de Raadt announced that the OpenBSD team is working with ISS > on a remote exploit for OpenSSH (a free implementation of the > Secure SHell protocol). They are refusing to provide any details on > the vulnerability but instead are advising everyone to upgrade to > the latest release, version 3.3.
Sounds like the bug isn't "fixed" but a work-around exists... Here is how the Mandrake Security Release reads: Mandrake Linux Security Update Advisory ________________________________________________________________________ Package name: openssh Advisory ID: MDKSA-2002:040 Date: June 24th, 2002 Affected versions: 7.1, 7.2, 8.0, 8.1, 8.2, Corporate Server 1.0.1, Single Network Firewall 7.2 ________________________________________________________________________ Problem Description: Details of an upcoming OpenSSH vulnerability will be published early next week. According to the OpenSSH team, this remote vulnerability cannot be exploited when sshd is running with privilege separation. The priv separation code is significantly improved in version 3.3 of OpenSSH which was released on June 21st. Unfortunately, there are some known problems with this release; compression does not work on all operating systems and the PAM support has not been completed. The OpenSSH team encourages everyone to upgrade to version 3.3 immediately and enable privilege separation. This can be enabled by placing in your /etc/ssh/sshd_config file the following: UsePrivilegeSeparation yes The vulnerability that will be disclosed next week is not fixed in version 3.3 of OpenSSH, however with priv separation enabled, you will not be vulnerable to it. This is because privilege separation uses a seperate non-privileged process to handle most of the work, meaning that any vulnerability in this part of OpenSSH will never lead to a root compromise. Only access as the non-privileged user restricted in chroot would be available. MandrakeSoft encourages all of our users to upgrade to the updated packages immediately. This update creates a new user and group on the system named sshd that is used to run the non-privileged processes. ________________________________________________________________________ References: http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=102495293705094&w=2 ________________________________________________________________________ ------------------------------------------------------- This sf.net email is sponsored by: Jabber Inc. Don't miss the IM event of the season | Special offer for OSDN members! JabConf 2002, Aug. 20-22, Keystone, CO http://www.jabberconf.com/osdn _______________________________________________ Leaf-devel mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/leaf-devel