-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 Mitel Networks Security Advisory: openssh
 
 Synopsis:    Updated OpenSSH packages fix potential vulnerability
 
 Release Date:       2003-09-17
 
 Severity:           Critical
 
 Affected Products:  SME Server (all versions)
 
 CVE (http://cve.mitre.org/):  CAN-2003-0693
 
 ----------------------------------------------------------
 PROBLEM DESCRIPTION
 ----------------------------------------------------------
 The versions of the OpenSSH package provided for optional remote
 access in products based on the unsupported developer version
 of the SME Server (and its commercial counterpart, the 6000 MAS)
 are potentially vulnerable to a buffer management error.  It is 
 unclear at this time if this vulnerability can be remotely 
 exploited, but due to the critical role ssh plays in secure 
 communication we are issuing this advisory.
 
 It is important to note that the SME Server ship with ssh access 
 DISABLED BY DEFAULT.  The server administrator would specifically 
 need to enable ssh access through the "Remote access" panel in 
 the web-based server manager.  We are aware, however, that many 
 users do enable ssh for remote administration.
 
 Mitel Networks encourages all administrators to apply this update
 immediately and to disable remote access via ssh until the update has 
 been applied.
 
 Note that versions of the unsupported developer release earlier 
 than 5.6 are also vulnerable, but Mitel Networks no longer provides 
 patches for those versions. Users of those obsolete versions should:
   - disable ssh access until an upgrade can be performed
   - upgrade to either 5.6 or 6.0beta3 and apply the update for that
version
 
 ----------------------------------------------------------
 Solution
 ----------------------------------------------------------
 
 Administrators of the commercial version of the product (the 6000 MAS)
 can simply apply the update by going to the "Blades" panel of the
 server manager and installing/upgrading the "ServiceLink" blade. 
 Commercial users can ask their reseller about Mitel Networks Security
 Advisory MNSA-2003-003 which contains more information.

 Users of the unsupported developer version need to download the
following
 RPMs from one of our mirror sites (see http://www.e-smith.org/download/
).
 MD5 sums are supplied below for verification.
 
 Note that this update is different from the OpenSSH packages
 released for Red Hat Linux 7.x as we have chosen to use the 
 latest available version of OpenSSH and enable additional 
 security features.
 
 6.0beta3:
 =========
 5fa5821927b79f045f52f988ec40a5dd  e-smith-openssh-1.10.1-01.noarch.rpm
 c6ef75446647bdd445fe6d8c4670f649  openssh-3.7.1p1-1es2.i386.rpm
 1ff815888b5b16c353c74ab75bd2cd9a  openssh-clients-3.7.1p1-1es2.i386.rpm
 2e332e6080106b91a05b781c1a6c0b02  openssh-server-3.7.1p1-1es2.i386.rpm

 5.6:
 ====
 f43fbe7957933d097328cee1b4d07a0f  e-smith-openssh-1.8.1-02.noarch.rpm
 c6ef75446647bdd445fe6d8c4670f649  openssh-3.7.1p1-1es2.i386.rpm
 1ff815888b5b16c353c74ab75bd2cd9a  openssh-clients-3.7.1p1-1es2.i386.rpm
 2e332e6080106b91a05b781c1a6c0b02  openssh-server-3.7.1p1-1es2.i386.rpm
 
 ----------------------------------------------------------
 References
 ----------------------------------------------------------
 For more information about this potential vulnerability, see:
 
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0693
   http://www.cert.org/advisories/CA-2003-24.html
   http://www.openssh.com/txt/buffer.adv
 
 ----------------------------------------------------------
  CONTACT INFORMATION
 ----------------------------------------------------------
 To contact Mitel Networks about this alert, please e-mail:
 
   [EMAIL PROTECTED]
 
 Mitel Networks Product Security Team
 
 Copyright 2003 Mitel Networks Corporation
 ----------------------------------------------------------
 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (MingW32) - WinPT 0.7.96rc1

iD8DBQE/a1BTtVk55/fjw7QRAtHgAKDNXupHtXFWeeWl9ELKIdcgEUP31gCeIijS
ob/T9l6GGkPlte40LCL/i5I=
=rKtx
-----END PGP SIGNATURE-----

--
Please report bugs to [EMAIL PROTECTED]
Please mail [EMAIL PROTECTED] (only) to discuss security issues
Support for registered customers and partners to [EMAIL PROTECTED]
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
Searchable archive at http://www.mail-archive.com/devinfo%40lists.e-smith.org

Reply via email to