Does anyone know about these vulnerabilities?
   A vulnerability exists in the default configuration of the Open SSH client
   that
   could be used to compromise the security of a client machine. By
   default, ssh clients will negotiate to forward X connections. This is done
   using the xauth program to place cookies in the authorization cache of
   the remote machine for the user logging in. If the superuser on the
   remote host cannot be trusted, or the root account has been
   compromised, the xauth key can be read from the user's .Xauthority file,
   and used to connect to the client machine. This can result in a wide
   range of compromises on the client host.
   OpenSSH is a free derivative of ssh1, a secure remote login tool. An
    option can be set (that is set to 'no' by default in most distributions) is
   to
    use the login program (the option is 'UseLogin'). When UseLogin is
    turned on, sshd doesn't set the uid of the person logging in to what it
    should be, it remains running as root. This can be exploited if a
    command is specified (to be executed) on the target host running sshd
    via the ssh client. Since instead of logging in, a command is being run,
    "login" is not used and therefore cannot set the correct userid. Any
    command executed remotely via ssh where "UseLogin" is on will execute
    as root, leading to a trivial compromise.

What versions are they in?  What can be done about them (I'm more curious about
the first one since, IMHO, UseLogin should never be turned on anyway).

Where can I find documentation on more vulnerabilities?

Thanks,
Noel



This communication is for informational purposes only.  It is not intended as
an offer or solicitation for the purchase or sale of any financial instrument
or as an official confirmation of any transaction. All market prices, data
and other information are not warranted as to completeness or accuracy and
are subject to change without notice. Any comments or statements made herein
do not necessarily reflect those of J.P. Morgan & Co. Incorporated, its
subsidiaries and affiliates.

Reply via email to