6775914 2001-07-20 17:34 -0700  /170 rader/ Stephanie Thomas <customer.service@ssh.com>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-21  02:53  av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <18237>
Ärende: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: "Stephanie Thomas" <customer.service@ssh.com>
To: <bugtraq@securityfocus.com>
Message-ID: <FNEKKFMHLBAMAHPEHBLMCEAGCAAA.customer.service@ssh.com>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Dear Secure Shell Community,

A potential remote root exploit has been discovered 
in SSH Secure Shell 3.0.0, for Unix only, concerning 
accounts with password fields consisting of two or 
fewer characters. Unauthorized users could potentially 
log in to these accounts using any password, including 
an empty password.  This affects SSH Secure Shell 3.0.0
for Unix only.  This is a problem with password 
authentication to the sshd2 daemon.  The SSH Secure 
Shell client binaries (located by default in 
/usr/local/bin) are not affected.   

SSH Secure Shell 3.0.1 fixes this problem.

Please note that if using a form of authentication 
other than password, AND password authentication 
is disabled, you are NOT VULNERABLE to this issue. 

PLATFORMS IMPACTED: 
  
Red Hat Linux 6.1 thru 7.1 
Solaris 2.6 thru 2.8 
HP-UX 10.20 
HP-UX 11.00 
Caldera Linux 2.4 
Suse Linux 6.4 thru 7.0 

Please note that other platforms not listed here 
may also be vulnerable. 

PLATFORMS NOT IMPACTED: 

Tru64 4.0.G, NetBSD, and OpenBSD are not vulnerable. 

Please note that other platforms not listed here 
may also be immune.

SCOPE

Some stock machines which have default locked accounts 
running SSH Secure Shell 3.0 are vulnerable to 
arbitrary logins.  This is a serious problem with 
Solaris, for example, which uses the sequence "NP" to 
indicate locked administrative accounts such as "lp", 
"adm", "bin" etc.  Some Linux machines which have 
accounts with !! in the etc/passwd or /etc/shadow such 
as xfs or gdm are also vulnerable. Since it is relatively 
easy to become root after gaining access to certain 
accounts, we consider this a potential root exploit.

DETAILED DESCRIPTION

During password authentication, if the field containing 
the encrypted password in /etc/shadow, /etc/password, 
etc. is two or less characters long, SSH 3.0.0 will 
allow anyone to access that account with ANY password.
The bug is in the code that compares the result of calling 
crypt(pw, salt) with the value of the encrypted password 
in the /etc/shadow (or /etc/password) file. SSH Secure Shell 
Server 3.0.0 does a bounded string compare bounded to the 
length of the value stored in aforementioned file (2 
characters in this case) against the return value of 
crypt(). The return value of crypt() is 13 characters, 
with the first two characters being the salt value itself.  
The salt value used is the first two characters of the 
encrypted password in /etc/shadow (or /etc/password). A 
2 character string comparison between the 2 character 
encrypted password in /etc/shadow, and the 13 character 
crypt() return value, whose first two characters ARE the 
2 characters from the password in /etc/shadow. The strings 
match, and the 3.0.0 daemon then accepts the password, no 
matter what is input. 

SOLUTIONS 

Preferred 

Immediately upgrade to SSH Secure Shell 3.0.1 
which will be available on our e-commerce site 
http://commerce.ssh.com shortly, and is available 
on the ftp site now - ftp://ftp.ssh.com/pub/ssh
A patch for 3.0.0 source code is also available there.

Alternative work-arounds 
  
Disable password authentication to the SSH Secure Shell 
daemon (sshd2) in the /etc/ssh2/sshd2_config and use 
another form of authentication such as public key, 
SecurID, Kerberos, certificates, Smart Cards, or 
hostbased to authenticate your users.  These alternative 
authentication methods are NOT VULNERABLE.  Please see 
our SSH Secure Shell support web pages for more 
information on how to enable these authentication methods. 

 OR 

If you cannot disable password authentication fully, 
limit access to the sshd2 daemon to allow only users 
with entries in the /etc/passwd and /etc/shadow which 
exceed two characters.  This can be done using the 
AllowUsers, AllowGroups, DenyUsers, and DenyGroups 
keywords in the /etc/ssh2/sshd2_config file.  See 
our SSH Secure Shell support web pages 
http://www.ssh.com/support/ssh and man sshd2_config 
for more information. 

 OR 

Assign a valid password for each account.  Because 
it is possible that assigning a password to some 
system accounts could cause problems on some operating 
systems, this work-around is limited and is provided 
only as a last-resort alternative.

 OR

Use the following patch in the source code:

"""
File /lib/sshsession/sshunixuser.c
Function ssh_user_validate_local_password
Location near line 953, before 
/*Authentication is accepted if the encrypted 
passwords are identical. */

Add lines

if (strlen(correct_passwd) < 13)
return FALSE;

"" 

We apologize for any inconvenience this may cause. 
SSH Communications Security takes security issues very 
seriously, and a CERT advisory and submission to Bugtraq 
regarding this issue have been submitted.  Please make 
every effort to ensure that your systems are protected 
using one of the above methods as quickly as possible.  
As this information becomes widely known, your systems could 
be at even greater risk if appropriate measures are not taken. 

SSH is fully committed to serving and supporting our users 
and products. While we may not be able to address each request
for information on this issue individually, we will 
make publicly available any relevant information possible 
which addresses your questions and concerns.

CREDITS

This vulnerability was found and reported by an 
anonymous system administrator at the Helsinki University 
of Technology and by Andrew Newman of Yale University.

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0.1

iQA/AwUBO1jNq9BQTPJLnwPSEQKmMQCeIOd7B30wubtA3p3hrAK61dZhn08AoIx+
kAzWH6o/mdL81W9TC4tJINgp
=2BQq
-----END PGP SIGNATURE-----
(6775914) /Stephanie Thomas <customer.service@ssh.com>/
Kommentar i text 6776002 av Dan Kaminsky <dankamin@cisco.com>
Kommentar i text 6777835 av Michal Zalewski <lcamtuf@gis.net>
Kommentar i text 6779326 av Jen B. <jen@sedition.org>
Kommentar i text 6779327 av Marcus Meissner <mm@ns.caldera.de>
Kommentar i text 6785045 av Florian Weimer <Florian.Weimer@RUS.Uni-Stuttgart.DE>
Kommentar i text 6785767 av Marcin Zurakowski <marcin@interfirma.pl>
Kommentar i text 6786240 av Jaime BENJUMEA <benjumea@dte.us.es>
Kommentar i text 6786276 av Roman Drahtmueller <draht@suse.de>
6776002 2001-07-20 19:11 -0700  /51 rader/ Dan Kaminsky <dankamin@cisco.com>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-21  05:07  av Brevbäraren
Extern mottagare: Stephanie Thomas <customer.service@ssh.com>
Extern mottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <18238>
Kommentar till text 6775914 av Stephanie Thomas <customer.service@ssh.com>
Ärende: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: "Dan Kaminsky" <dankamin@cisco.com>
To: "Stephanie Thomas" <customer.service@ssh.com>,
 <bugtraq@securityfocus.com>
Message-ID: <007b01c1118a$64bb2570$1900010a@na.cisco.com>

> Some stock machines which have default locked accounts
> running SSH Secure Shell 3.0 are vulnerable to
> arbitrary logins.  This is a serious problem with
> Solaris, for example, which uses the sequence "NP" to
> indicate locked administrative accounts such as "lp",
> "adm", "bin" etc.  Some Linux machines which have
> accounts with !! in the etc/passwd or /etc/shadow such
> as xfs or gdm are also vulnerable. Since it is relatively
> easy to become root after gaining access to certain
> accounts, we consider this a potential root exploit.

Since on Solaris all the standard binaries(sh, ls, rm, etc.) are bin
owned, all systems with SSH-3.0 should be considered to be completely
rootable by even basic unix-aware attackers.  Worse, the nature of
the SSH protocols is that the exact version of the SSH server shows
up upon initial connection to the SSHD port.  This means a mass scan,
combined perhaps with minor TCP property analysis, will reveal both
the vulnerable SSHD and the specific OS whose accounts are to be
attacked.

Mass SSH scanners are available; it may be worthwhile as an
administrator to search and cleanse your network before someone else
does.  While you're at it, watch for OpenSSH 2.2.0p2 in particular,
as there apparently exist Linux root exploits for that obscure
deattack.c bug found several months ago.

The big issue here, of course, is not that sshd incorrectly checks
the cryptographic hash of an inadequately sized password but that it
checks it at all.  NP, as far as I know, specifically stands for No
Password (acceptable, *not* needed), and !! I believe has the same
meaning for Linux(! for "no").  SSHD has traditionally when possible
directly tested its passwords straight through most available
interfaces, be them a raw password file or a PAM call.  But when the
SSHD checked the cryptography of NP or !!, it failed to successfully
parse the critical message in the password database:  Let Nothing At
All, No Matter What, In.

When such a message exists, it deserves immediate servicing.  They
expected the cryptography to fail; it was an implicit assumption that
an explicit security-critical demand would be serviced automatically.
The assumption was incorrect, and now a reasonably major hole exists.

Yours Truly,

    Dan Kaminsky, CISSP
    http://www.doxpara.com
(6776002) /Dan Kaminsky <dankamin@cisco.com>/(Ombruten)
Kommentar i text 6778712 av Dale Southard <southard1@llnl.gov>
Kommentar i text 6785928 av Brandon S. Allbery KF8NH <allbery@ece.cmu.edu>
6778712 2001-07-21 13:50 -0700  /48 rader/ Dale Southard <southard1@llnl.gov>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-21  23:32  av Brevbäraren
Extern mottagare: Dan Kaminsky <dankamin@cisco.com>
Extern kopiemottagare: Stephanie Thomas <customer.service@ssh.com>
Extern kopiemottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <18240>
Kommentar till text 6776002 av Dan Kaminsky <dankamin@cisco.com>
Ärende: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: Dale Southard <southard1@llnl.gov>
To: "Dan Kaminsky" <dankamin@cisco.com>
Cc: "Stephanie Thomas" <customer.service@ssh.com>,
 <bugtraq@securityfocus.com>
Message-ID: <n15y80rn.fsf@riptide.llnl.gov>

"Dan Kaminsky" <dankamin@cisco.com> writes:

> The big issue here, of course, is not that sshd incorrectly checks the
> cryptographic hash of an inadequately sized password but that it checks it
> at all.  NP, as far as I know, specifically stands for No Password
> (acceptable, *not* needed), and !! I believe has the same meaning for
> Linux(! for "no").  

Actually, I don't think it is nearly that complex...

On systems that use the standard unix crypt(), that function always
returns a 13 character string (a 2 character salt followed by an 11
character hash).  When a user tries to login, the system gets the 2
character salt from the password file and a password from the user,
and then runs those through crypt() and compares the 13 character
result to the hash string in the password file.  If they match, he/she
is authenticated.

Things like ``!!'', ``NP'', ``*LK*'' in the password file do not need
to have to have any special meaning to the OS other than the fact that
they are not 13 characters and thus will never match the output of
crypt().

Sshd should probably be constraining its match to the length of the
crypt() output rather than the length of the password file entry.  [I
say ``probably'' here because some systems (AIX) seem to produce null
password file hashes when `passwd` is given a null password.  If that
behavior is due to the underlying crypt() function, then the
``probably'' suggestion I just made yields remote root on those
systems.]

Systems that use md5 or blowfish for password hashing do something
different.   :-) :-)

-- 

/*  Dale Southard Jr.       southard1@llnl.gov        925-422-1463  */
/*  Computer Scientist, Accelerated Strategic Computing Initiative  */
/*  L-550,  Lawrence Livermore National Lab,  Livermore CA   94551  */
/*  AFF/I, SL/I, T/I, D-11216, Sr. Rig --- I'd rather be skydiving  */
(6778712) /Dale Southard <southard1@llnl.gov>/------
Kommentar i text 6785329 av Nate Eldredge <neldredge@hmc.edu>
6785329 2001-07-22 06:14 -0700  /29 rader/ Nate Eldredge <neldredge@hmc.edu>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-23  19:22  av Brevbäraren
Extern mottagare: Dale Southard <southard1@llnl.gov>
Extern kopiemottagare: Dan Kaminsky <dankamin@cisco.com>
Extern kopiemottagare: Stephanie Thomas <customer.service@ssh.com>
Extern kopiemottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <18253>
Kommentar till text 6778712 av Dale Southard <southard1@llnl.gov>
Ärende: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: Nate Eldredge <neldredge@hmc.edu>
To: Dale Southard <southard1@llnl.gov>
Cc: Dan Kaminsky <dankamin@cisco.com>,
 Stephanie Thomas <customer.service@ssh.com>,
 bugtraq@securityfocus.com
Message-ID: <Pine.LNX.4.21.0107220554010.24934-100000@odin.ac.hmc.edu>

On 21 Jul 2001, Dale Southard wrote:

> Sshd should probably be constraining its match to the length of the
> crypt() output rather than the length of the password file entry.  [I
> say ``probably'' here because some systems (AIX) seem to produce null
> password file hashes when `passwd` is given a null password.  If that
> behavior is due to the underlying crypt() function, then the
> ``probably'' suggestion I just made yields remote root on those
> systems.]

What's wrong with just using `strcmp' (i.e. no constraint at all)?
After all, what you want to know is just whether the two strings are
identical, period.  And unless crypt() and /etc/shadow are both
broken, it will stop  at the right place.  I realize it goes against
the reflexive "only strn* functions are safe" idea, but that
shouldn't substitute for thinking...

-- 

Nate Eldredge
neldredge@hmc.edu
(6785329) /Nate Eldredge <neldredge@hmc.edu>/(Ombruten)
6785928 2001-07-20 23:08 -0400  /27 rader/ Brandon S. Allbery KF8NH <allbery@ece.cmu.edu>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-23  21:06  av Brevbäraren
Extern mottagare: Dan Kaminsky <dankamin@cisco.com>
Extern mottagare: Stephanie Thomas <customer.service@ssh.com>
Extern mottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <18263>
Kommentar till text 6776002 av Dan Kaminsky <dankamin@cisco.com>
Ärende: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: "Brandon S. Allbery KF8NH" <allbery@ece.cmu.edu>
To: Dan Kaminsky <dankamin@cisco.com>,
 Stephanie Thomas <customer.service@ssh.com>,
 bugtraq@securityfocus.com
Message-ID: <70920000.995684910@vpn88.ece.cmu.edu>

On Friday, July 20, 2001 19:11:02 -0700, Dan Kaminsky
<dankamin@cisco.com>  wrote:
+-----
| The big issue here, of course, is not that sshd incorrectly checks the
| cryptographic hash of an inadequately sized password but that it checks it
| at all.  NP, as far as I know, specifically stands for No Password
| (acceptable, *not* needed), and !! I believe has the same meaning for
| Linux(! for "no").  SSHD has traditionally when possible directly tested
+--->8

Is it me, or is this the *same* bug that was found in the 1.2.x code
some  time back?


-- 
brandon s. allbery  [os/2][linux][solaris][freebsd]   allbery@kf8nh.apk.net
system administrator   [JAPH][WAY too many hats]        allbery@ece.cmu.edu
electrical and computer engineering                                   KF8NH
carnegie mellon university     [linux: proof of the million monkeys theory]
(6785928) /Brandon S. Allbery KF8NH <allbery@ece.cmu.edu>/(Ombruten)
6777835 2001-07-21 11:16 -0400  /22 rader/ Michal Zalewski <lcamtuf@gis.net>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-21  19:21  av Brevbäraren
Extern mottagare: Stephanie Thomas <customer.service@ssh.com>
Extern kopiemottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <18239>
Kommentar till text 6775914 av Stephanie Thomas <customer.service@ssh.com>
Ärende: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: Michal Zalewski <lcamtuf@gis.net>
To: Stephanie Thomas <customer.service@ssh.com>
Cc: bugtraq@securityfocus.com
Message-ID: <Pine.LNX.4.21.0107211106280.785-100000@nimue.bos.bindview.com>

On Fri, 20 Jul 2001, Stephanie Thomas wrote:

> PLATFORMS IMPACTED: Red Hat Linux 6.1 thru 7.1

RedHat Linux 7.0 ships OpenSSH 2.2.1 (7.0). RedHat Linux 7.1 ships
OpenSSH 2.5.2. Previous versions shipped SSH 1.2.xx, which, if I
understood, are not vulnerable. You are vulnerable only if you have
installed SSH.com SSH 3.0.0 by hand, but then, it is not RedHat fault.

-- 
_____________________________________________________
Michal Zalewski [lcamtuf@bos.bindview.com] [security]
[http://lcamtuf.coredump.cx] <=-=> bash$ :(){ :|:&};:
=-=> Did you know that clones never use mirrors? <=-=
(6777835) /Michal Zalewski <lcamtuf@gis.net>/(Ombruten)
Kommentar i text 6779304 av  <j@jedi.claranet.fr>
Kommentar i text 6785830 av Trond Eivind Glomsrød <teg@redhat.com>
6779304 2001-07-21 18:27 +0000  /21 rader/  <j@jedi.claranet.fr>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-22  06:15  av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Extern kopiemottagare: Stephanie Thomas <customer.service@ssh.com>
Mottagare: Bugtraq (import) <18241>
Kommentar till text 6777835 av Michal Zalewski <lcamtuf@gis.net>
Ärende: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: j@jedi.claranet.fr
To: bugtraq@securityfocus.com
Cc: Stephanie Thomas <customer.service@ssh.com>
Message-ID: <20010721182701.5D205D99E@mail.fr.clara.net>


Michal Zalewski wrote:

> You are vulnerable only if you have installed SSH.com SSH
> 3.0.0 by hand, but then, it is not RedHat fault.

  Same thing with SuSE.

  No version of SuSE Linux comes with SSH 3.0 as far as I know.

--
Frank DENIS aka Jedi/Sector One <j@c9x.org>
Upgrade your FTP server to something simple and secure :
http://www.pureftpd.org - http://metalog.sourceforge.net
(6779304) / <j@jedi.claranet.fr>/-------------------
6785830 2001-07-21 17:00 -0400  /22 rader/ Trond Eivind Glomsrød <teg@redhat.com>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-23  20:52  av Brevbäraren
Extern mottagare: Michal Zalewski <lcamtuf@gis.net>
Extern kopiemottagare: Stephanie Thomas <customer.service@ssh.com>
Extern kopiemottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <18260>
Kommentar till text 6777835 av Michal Zalewski <lcamtuf@gis.net>
Ärende: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: teg@redhat.com (Trond Eivind Glomsrød)
To: Michal Zalewski <lcamtuf@gis.net>
Cc: Stephanie Thomas <customer.service@ssh.com>,
 bugtraq@securityfocus.com
Message-ID: <xuyae1ym1z6.fsf@halden.devel.redhat.com>

Michal Zalewski <lcamtuf@gis.net> writes:

> On Fri, 20 Jul 2001, Stephanie Thomas wrote:
> 
> > PLATFORMS IMPACTED: Red Hat Linux 6.1 thru 7.1
> 
> RedHat Linux 7.0 ships OpenSSH 2.2.1 (7.0). RedHat Linux 7.1 ships OpenSSH
> 2.5.2. Previous versions shipped SSH 1.2.xx

Releases of Red Hat Linux earlier than RHL 7 didn't ship openssh or
ssh at all.

-- 
Trond Eivind Glomsrød
Red Hat, Inc.
(6785830) /Trond Eivind Glomsrød <teg@redhat.com>/(Ombruten)
6779326 2001-07-21 04:47 -0400  /67 rader/ Jen B. <jen@sedition.org>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-22  06:52  av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <18243>
Kommentar till text 6775914 av Stephanie Thomas <customer.service@ssh.com>
Ärende: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: "Jen B." <jen@sedition.org>
To: bugtraq@securityfocus.com
Message-ID: <Pine.BSF.4.21.0107210427120.59077-100000@puck.rageandfury.com>



<from SSH's advisory>
> in SSH Secure Shell 3.0.0, for Unix only, concerning
> accounts with password fields consisting of two or
> fewer characters.

I've tested this on a few machines that I recently upgraded
and have a nit to pick the "or fewer" portion of this statement. 
It's quite late here and I feel I am stating the elementary, 
further comments and corrections would be very helpful.

On RH 6.2 some of the password fields are
nulled in /etc/shadow with "*" and some with "!!"

The only accounts vulnerable to this bug were the ones using "!!"
or any other two-character combinations that I tried. I replaced
the offending accounts with a single character and was unable to login
with the "ease" that I had before. I tested on  Debian 2.2 and
RedHat 6.2.  It is worth noting that Debian does NOT null logins in
/etc/shadow using two characters by default like Red Hat.

btw, I also tested on FreeBSD-4.2 and was unable to login
without providing the proper password regardless of the number of
characters I had in the password field. 


-Jen
jen@sedition.org

debian:~# telnet localhost 22
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
SSH-2.0-3.0.0 SSH Secure Shell (non-commercial)

Connection closed by foreign host.  debian:~# uname -a Linux debian
2.4.6-pre3 #4 SMP Tue Jun 26 12:34:37 EST 2001 ppc unknown debian:~#
cat /etc/shadow | grep irc irc:!!:11498:0:99999:7::: debian:~# ssh -l
irc localhost irc's password: Authentication successful.  Last login:
Sat Jul 21 2001 01:44:01 -0500 No mail.  irc@debian:~$ debian:~# vi
/etc/shadow ...  debian:~# cat /etc/shadow | grep irc
irc:!:11498:0:99999:7::: debian:~# ssh -l irc localhost irc's
password: irc's password: irc's password: warning: Authentication
failed.  Disconnected; no more authentication methods available (No
further authentication methods available.).
(6779326) /Jen B. <jen@sedition.org>/-----(Ombruten)
6779327 2001-07-22 00:48 +0200  /43 rader/ Marcus Meissner <mm@ns.caldera.de>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-22  06:52  av Brevbäraren
Extern mottagare: "Stephanie Thomas" <customer.service@ssh.com>
Extern mottagare: bugtraq@securityfocus.com
Extern mottagare: okir@caldera.de
Mottagare: Bugtraq (import) <18244>
Kommentar till text 6775914 av Stephanie Thomas <customer.service@ssh.com>
Ärende: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: Marcus Meissner <mm@ns.caldera.de>
To: customer.service@ssh.com ("Stephanie Thomas"),
 bugtraq@securityfocus.com, okir@caldera.de
Message-ID: <200107212248.f6LMmwi31696@ns.caldera.de>

In article <FNEKKFMHLBAMAHPEHBLMCEAGCAAA.customer.service@ssh.com> you wrote:
> Dear Secure Shell Community,

> A potential remote root exploit has been discovered 
> in SSH Secure Shell 3.0.0, for Unix only, concerning 
> accounts with password fields consisting of two or 
> fewer characters. Unauthorized users could potentially 
> log in to these accounts using any password, including 
> an empty password.  This affects SSH Secure Shell 3.0.0
> for Unix only.  This is a problem with password 
> authentication to the sshd2 daemon.  The SSH Secure 
> Shell client binaries (located by default in 
> /usr/local/bin) are not affected.   

> SSH Secure Shell 3.0.1 fixes this problem.
> ...
> ... Vulnerable ...
> ...
> Caldera Linux 2.4 


Caldera is not shipping the commercial version of SSH in its Linux
distribtuins and so is NOT vulnerable except in cases where the
administrator installed the commercial version of SSH.

We are instead providing OpenSSH version 2.9p2 for all supported
platforms, which is not affected by above flaw.

Ciao, Marcus
-- 
      _____     ___
     /  __/____/  /                Caldera (Deutschland) GmbH
    /  /_/ __  / /__          Naegelsbachstr. 49c, 91052 Erlangen
   /_____//_/ /____/       Dipl. Inf. Marcus Meissner, email: mm@caldera.de
  ==== /_____/ ======    phone: ++49 9131 7912-300, fax: ++49 9131 7192-399
   Caldera OpenLinux
(6779327) /Marcus Meissner <mm@ns.caldera.de>/(Ombruten)
6785045 2001-07-22 10:03 +0200  /26 rader/ Florian Weimer <Florian.Weimer@RUS.Uni-Stuttgart.DE>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-23  17:50  av Brevbäraren
Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM
Extern kopiemottagare: customer.service@ssh.com
Mottagare: Bugtraq (import) <18248>
Kommentar till text 6775914 av Stephanie Thomas <customer.service@ssh.com>
Ärende: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: Florian Weimer <Florian.Weimer@RUS.Uni-Stuttgart.DE>
To: BUGTRAQ@SECURITYFOCUS.COM
Cc: customer.service@ssh.com
Message-ID: <tg3d7pfl0s.fsf@mercury.rus.uni-stuttgart.de>

"Stephanie Thomas" <customer.service@ssh.com> writes:

> A potential remote root exploit has been discovered 
> in SSH Secure Shell 3.0.0, for Unix only, concerning 
> accounts with password fields consisting of two or 
> fewer characters.

A quick glance at the source code suggests that SSH 2.3.0 and 2.4.0
have the same problem.  Is this true?

> Use the following patch in the source code:

It is not quite clear whether the license agreement permits
modification of the source code.

-- 
Florian Weimer 	                  Florian.Weimer@RUS.Uni-Stuttgart.DE
University of Stuttgart           http://cert.uni-stuttgart.de/
RUS-CERT                          +49-711-685-5973/fax +49-711-685-5898
(6785045) /Florian Weimer <Florian.Weimer@RUS.Uni-Stuttgart.DE>/
Kommentar i text 6785085 av Thomas Roessler <roessler@does-not-exist.org>
6785085 2001-07-23 17:42 +0200  /25 rader/ Thomas Roessler <roessler@does-not-exist.org>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-23  18:04  av Brevbäraren
Extern mottagare: Florian Weimer <Florian.Weimer@RUS.Uni-Stuttgart.DE>
Extern kopiemottagare: BUGTRAQ@SECURITYFOCUS.COM
Extern kopiemottagare: customer.service@ssh.com
Mottagare: Bugtraq (import) <18249>
Kommentar till text 6785045 av Florian Weimer <Florian.Weimer@RUS.Uni-Stuttgart.DE>
Ärende: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
On 2001-07-22 10:03:31 +0200, Florian Weimer wrote:

>A quick glance at the source code suggests that SSH 2.3.0 and 
>2.4.0 have the same problem.  Is this true?

I suppose we are talking about this section of ssh 2.4.0's
sshunixuser.c:

   940
   941	  /* Authentication is accepted if the encrypted passwords are identical. */
   942	#ifdef HAVE_HPUX_TCB_AUTH
   943	  return strncmp(encrypted_password, correct_passwd,
   944	                 strlen(correct_passwd)) == 0;
   945	#else /* HAVE_HPUX_TCB_AUTH */
   946	  return strcmp(encrypted_password, correct_passwd) == 0;
   947	#endif /* HAVE_HPUX_TCB_AUTH */

If I read this correctly, it's certainly not a problem unless ssh is 
compiled with HAVE_HPUX_TCB_AUTH defined.  In that case, it may or 
may not be a problem.

-- 
Thomas Roessler                        http://log.does-not-exist.org/
(6785085) /Thomas Roessler <roessler@does-not-exist.org>/
Bilaga (application/pgp-signature) i text 6785086
Kommentar i text 6786172 av Lucian Hudin <luci@warp.transart.ro>
Kommentar i text 6790873 av Sports <madboo@gwu.edu>
6785086 2001-07-23 17:42 +0200  /13 rader/ Thomas Roessler <roessler@does-not-exist.org>
Importerad: 2001-07-23  18:04  av Brevbäraren
Extern mottagare: Florian Weimer <Florian.Weimer@RUS.Uni-Stuttgart.DE>
Extern kopiemottagare: BUGTRAQ@SECURITYFOCUS.COM
Extern kopiemottagare: customer.service@ssh.com
Mottagare: Bugtraq (import) <18250>
Bilaga (text/plain) till text 6785085
Ärende: Bilaga till: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)

iQEVAwUBO1xF1NImKUTOasbBAQKt/gf/cCyWpS+lsV5WE/C3sLqu2ZGzxvaYZWHr
Oz2VDvmdRt21zDq/jCUHF4n7HjZFSfJtn+o4Ow7zo/qvPMjQ81vorGmnuBwu9NHp
+NiRSdngNY/PKzN2o8y8Yd8pW0XDenUT3a1S+sdbT1vCRJFl8E67EE+Wff92yKqs
WLb3TWJzPZndoJFeaaTvSGnpBxbKji0KEUmbWQZwgGiRbaGlqRBuFldlXLmAz0iT
Wwb2O9IxYa3obfqi+yndoS5bcnR0MId7Z4PLaNxL9UkSfsL6WAaQFdCUDWx6t0zw
2ALXLP1kuqx62pA0lPcnlU+CAfqJ0fqVOFTdOzRcTUxS5RDkySZ/xg==
=UzVv
-----END PGP SIGNATURE-----
(6785086) /Thomas Roessler <roessler@does-not-exist.org>/
6786172 2001-07-23 19:08 +0300  /32 rader/ Lucian Hudin <luci@warp.transart.ro>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-23  21:51  av Brevbäraren
Extern mottagare: Thomas Roessler <roessler@does-not-exist.org>
Extern kopiemottagare: Florian Weimer <Florian.Weimer@RUS.Uni-Stuttgart.DE>
Extern kopiemottagare: BUGTRAQ@securityfocus.com
Extern kopiemottagare: customer.service@ssh.com
Mottagare: Bugtraq (import) <18269>
Kommentar till text 6785085 av Thomas Roessler <roessler@does-not-exist.org>
Ärende: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: Lucian Hudin <luci@warp.transart.ro>
To: Thomas Roessler <roessler@does-not-exist.org>
Cc: Florian Weimer <Florian.Weimer@RUS.Uni-Stuttgart.DE>,
 <BUGTRAQ@securityfocus.com>, <customer.service@ssh.com>
Message-ID: <Pine.LNX.4.30.0107231907180.30119-100000@warp.transart.ro>

>
> >A quick glance at the source code suggests that SSH 2.3.0 and
> >2.4.0 have the same problem.  Is this true?
>
> I suppose we are talking about this section of ssh 2.4.0's
> sshunixuser.c:
>
>    940
>    941	  /* Authentication is accepted if the encrypted passwords are identical. */
>    942	#ifdef HAVE_HPUX_TCB_AUTH
>    943	  return strncmp(encrypted_password, correct_passwd,
>    944	                 strlen(correct_passwd)) == 0;
>    945	#else /* HAVE_HPUX_TCB_AUTH */
>    946	  return strcmp(encrypted_password, correct_passwd) == 0;
>    947	#endif /* HAVE_HPUX_TCB_AUTH */
>
> If I read this correctly, it's certainly not a problem unless ssh is
> compiled with HAVE_HPUX_TCB_AUTH defined.  In that case, it may or

the linux compile at least doesn't #define HAVE_HPUX_TCB_AUTH so
the sshd 2.4.0 is not vulnerable on linux.

Luci
(6786172) /Lucian Hudin <luci@warp.transart.ro>/----
Kommentar i text 6786930 av masse (passion för pumpakärnor)
6790873 2001-07-23 15:17 -0400  /54 rader/ Sports <madboo@gwu.edu>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-24  21:04  av Brevbäraren
Extern mottagare: 'Thomas Roessler' <roessler@does-not-exist.org>
Extern mottagare: 'Florian Weimer' <Florian.Weimer@RUS.Uni-Stuttgart.DE>
Extern kopiemottagare: BUGTRAQ@SECURITYFOCUS.COM
Extern kopiemottagare: customer.service@ssh.com
Externa svar till: madboo@gwu.edu
Mottagare: Bugtraq (import) <18303>
Kommentar till text 6785085 av Thomas Roessler <roessler@does-not-exist.org>
Ärende: RE: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: "Sports" <madboo@gwu.edu>
To: "'Thomas Roessler'" <roessler@does-not-exist.org>,
 "'Florian Weimer'" <Florian.Weimer@RUS.Uni-Stuttgart.DE>
Cc: <BUGTRAQ@SECURITYFOCUS.COM>, <customer.service@ssh.com>
Message-ID: <001101c113ac$1c4b8ae0$1200a8c0@com>

 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

What about 2.9?

- -----Original Message-----
From: Thomas Roessler [mailto:roessler@does-not-exist.org]
Sent: Monday, July 23, 2001 11:42 AM
To: Florian Weimer
Cc: BUGTRAQ@SECURITYFOCUS.COM; customer.service@ssh.com
Subject: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0


On 2001-07-22 10:03:31 +0200, Florian Weimer wrote:

>A quick glance at the source code suggests that SSH 2.3.0 and 
>2.4.0 have the same problem.  Is this true?

I suppose we are talking about this section of ssh 2.4.0's
sshunixuser.c:

   940
   941	  /* Authentication is accepted if the encrypted passwords are
identical. */
   942	#ifdef HAVE_HPUX_TCB_AUTH
   943	  return strncmp(encrypted_password, correct_passwd,
   944	                 strlen(correct_passwd)) == 0;
   945	#else /* HAVE_HPUX_TCB_AUTH */
   946	  return strcmp(encrypted_password, correct_passwd) == 0;
   947	#endif /* HAVE_HPUX_TCB_AUTH */

If I read this correctly, it's certainly not a problem unless ssh is 
compiled with HAVE_HPUX_TCB_AUTH defined.  In that case, it may or 
may not be a problem.

- -- 
Thomas Roessler                        http://log.does-not-exist.org/

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>

iQA/AwUBO1x4RXuovSIevPCzEQJgrACg7nG4kHVms/VV/fjKZPcT9OV0JRIAn2pG
Aqs6zdkLUaAYXceFoA3ydrLI
=8e4m
-----END PGP SIGNATURE-----
(6790873) /Sports <madboo@gwu.edu>/-----------------
Kommentar i text 6791039 av Seth Arnold <sarnold@wirex.com>
6791039 2001-07-24 12:06 -0700  /15 rader/ Seth Arnold <sarnold@wirex.com>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-24  21:59  av Brevbäraren
Extern mottagare: BUGTRAQ@securityfocus.com
Mottagare: Bugtraq (import) <18314>
Kommentar till text 6790873 av Sports <madboo@gwu.edu>
Ärende: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: Seth Arnold <sarnold@wirex.com>
To: BUGTRAQ@securityfocus.com
Message-ID: <20010724120642.W15481@wirex.com>

On Mon, Jul 23, 2001 at 03:17:26PM -0400, Sports wrote:
> What about 2.9?

> >A quick glance at the source code suggests that SSH 2.3.0 and 
> >2.4.0 have the same problem.  Is this true?

You've fallen pray to the 'product problem'. 2.9 is OpenSSH. 2.3.0,
2.4.0, and 3.0 are ssh.com. This problem is in the ssh.com version,
but not in OpenSSH.
(6791039) /Seth Arnold <sarnold@wirex.com>/(Ombruten)
6785767 2001-07-21 11:11 +0200  /19 rader/ Marcin Zurakowski <marcin@interfirma.pl>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-23  20:42  av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <18258>
Kommentar till text 6775914 av Stephanie Thomas <customer.service@ssh.com>
Ärende: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: Marcin Zurakowski <marcin@interfirma.pl>
To: <bugtraq@securityfocus.com>
Message-ID: <Pine.LNX.4.33.0107211105260.24318-100000@inter1.interfirma.pl>

On Fri, 20 Jul 2001, Stephanie Thomas wrote:

> an empty password.  This affects SSH Secure Shell 3.0.0

I guess openssh with pam support is not vulnerable??

-- 

Marcin Zurakowski

InterFirma Administrator
(6785767) /Marcin Zurakowski <marcin@interfirma.pl>/
Kommentar i text 6785963 av Brian Carpio <carb02@csgsystems.com>
6785963 2001-07-23 10:31 -0600  /39 rader/ Brian Carpio <carb02@csgsystems.com>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-23  21:10  av Brevbäraren
Extern mottagare: Marcin Zurakowski <marcin@interfirma.pl>
Extern kopiemottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <18264>
Kommentar till text 6785767 av Marcin Zurakowski <marcin@interfirma.pl>
Ärende: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: Brian Carpio <carb02@csgsystems.com>
To: Marcin Zurakowski <marcin@interfirma.pl>
Cc: bugtraq@securityfocus.com
Message-ID: <Pine.GSO.4.10.10107231030340.15120-100000@sylvester.co.csgsystems.com>


OpenSSH is not vulnerable at all weather or not you use PAM.. this is
SSH the commercial Version.

If you didn't pay for it then you are OK!! 

--------------
Brian Carpio
CSG Systems Inc.
Open Systems Unix System Admin

x3317
--------------

--- Security is a Process NOT a Product ----

On Sat, 21 Jul 2001, Marcin Zurakowski wrote:

> On Fri, 20 Jul 2001, Stephanie Thomas wrote:
> 
> > an empty password.  This affects SSH Secure Shell 3.0.0
> 
> I guess openssh with pam support is not vulnerable??
> 
> -- 
> 
> Marcin Zurakowski
> 
> InterFirma Administrator
> 
> 
>
(6785963) /Brian Carpio <carb02@csgsystems.com>/(Ombruten)
Kommentar i text 6787069 av Stephanie Thomas <customer.service@ssh.com>
6787069 2001-07-23 12:17 -0700  /93 rader/ Stephanie Thomas <customer.service@ssh.com>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-24  02:01  av Brevbäraren
Extern mottagare: Brian Carpio <carb02@csgsystems.com>
Extern kopiemottagare: Marcin Zurakowski <marcin@interfirma.pl>
Extern kopiemottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <18280>
Kommentar till text 6785963 av Brian Carpio <carb02@csgsystems.com>
Ärende: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: Stephanie Thomas <customer.service@ssh.com>
To: Brian Carpio <carb02@csgsystems.com>
Cc: Marcin Zurakowski <marcin@interfirma.pl>,
 bugtraq@securityfocus.com
Message-ID: <3B5C783D.B57B14D9@ssh.com>

Hi Brian, et. al.,

Actually, this statement:

> If you didn't pay for it then you are OK!!

is not true.  SSH Communications Security provides 
SSH Secure Shell for non-commercial / educational 
use, and commercial use on the free operating systems
(Linux / BSDs), free of charge.

Those non-commercial users of SSH Secure Shell 3.0 
(who didn't pay for it) are still vulnerable.

If you are using SSH Secure Shell 3.0, whether you
paid for it or not, please upgrade ASAP.  Non-commercial
/ education users can locate the upgrade at:

ftp://ftp.ssh.com/pub/ssh

Best Regards,

Steph

-- 
*********************************
Stephanie Thomas
Technical Support Specialist
SSH Secure Shell
GIAC Certified
Unix Security Administrator
SSH Communications Security Inc.
http://www.ssh.com/support/ssh
*********************************


Brian Carpio wrote:
> 
> OpenSSH is not vulnerable at all weather or not you use PAM.. this is SSH
> the commercial Version.
> 
> If you didn't pay for it then you are OK!!
> 
> --------------
> Brian Carpio
> CSG Systems Inc.
> Open Systems Unix System Admin
> 
> x3317
> --------------
> 
> --- Security is a Process NOT a Product ----
> 
> On Sat, 21 Jul 2001, Marcin Zurakowski wrote:
> 
> > On Fri, 20 Jul 2001, Stephanie Thomas wrote:
> >
> > > an empty password.  This affects SSH Secure Shell 3.0.0
> >
> > I guess openssh with pam support is not vulnerable??
> >
> > --
> >
> > Marcin Zurakowski
> >
> > InterFirma Administrator
> >
> >
> >

-- 
*********************************
Please note that for support cases,
if I have not heard otherwise within five
business days, I will assume that your issue
is resolved.

Stephanie Thomas
Technical Support Specialist
SSH Secure Shell
GIAC Certified
Unix Security Administrator
SSH Communications Security Inc.
http://www.ssh.com/support/ssh
*********************************
(6787069) /Stephanie Thomas <customer.service@ssh.com>/
6786240 2001-07-21 18:26 +0200  /22 rader/ Jaime BENJUMEA <benjumea@dte.us.es>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-23  22:02  av Brevbäraren
Extern mottagare: Stephanie Thomas <customer.service@ssh.com>
Extern kopiemottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <18272>
Kommentar till text 6775914 av Stephanie Thomas <customer.service@ssh.com>
Ärende: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: Jaime BENJUMEA <benjumea@dte.us.es>
To: Stephanie Thomas <customer.service@ssh.com>
Cc: bugtraq@securityfocus.com
Message-ID: <Pine.LNX.4.21.0107211822500.26082-100000@teclix.dte.us.es>


Stephanie Thomas wrote:

> 
> A potential remote root exploit has been discovered 
> in SSH Secure Shell 3.0.0, for Unix only, concerning 
> accounts with password fields consisting of two or 
> fewer characters. Unauthorized users could potentially 
> log in to these accounts using any password, including 
> an empty password.  This affects SSH Secure Shell 3.0.0
> for Unix only.  This is a problem with password 

Does anybody know if previous versions (2.4) are also affected?
(6786240) /Jaime BENJUMEA <benjumea@dte.us.es>/-----
Kommentar i text 6786391 av Jonathan A. Zdziarski <jonathan.zdziarski@micromuse.com>
6786391 2001-07-23 13:12 -0400  /36 rader/ Jonathan A. Zdziarski <jonathan.zdziarski@micromuse.com>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-23  22:36  av Brevbäraren
Extern mottagare: Jaime BENJUMEA <benjumea@dte.us.es>
Extern mottagare: Stephanie Thomas <customer.service@ssh.com>
Extern kopiemottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <18276>
Kommentar till text 6786240 av Jaime BENJUMEA <benjumea@dte.us.es>
Ärende: RE: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: "Jonathan A. Zdziarski" <jonathan.zdziarski@micromuse.com>
To: "Jaime BENJUMEA" <benjumea@dte.us.es>,
 "Stephanie Thomas" <customer.service@ssh.com> Cc:
<bugtraq@securityfocus.com> Message-ID:
<COEPIIFFJPONEJNLHKOEIEGDCBAA.jonathan.zdziarski@micromuse.com>

Both 2.3.0 and 2.4.0 don't appear to be vulnerable on my system (Intel
Solaris 8).  3.0.0 *was* vulnerable, however, and I was able to easily
exploit the system.

-----Original Message-----
From: Jaime BENJUMEA [mailto:benjumea@dte.us.es]
Sent: Saturday, July 21, 2001 12:27 PM
To: Stephanie Thomas
Cc: bugtraq@securityfocus.com
Subject: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0



Stephanie Thomas wrote:

>
> A potential remote root exploit has been discovered
> in SSH Secure Shell 3.0.0, for Unix only, concerning
> accounts with password fields consisting of two or
> fewer characters. Unauthorized users could potentially
> log in to these accounts using any password, including
> an empty password.  This affects SSH Secure Shell 3.0.0
> for Unix only.  This is a problem with password

Does anybody know if previous versions (2.4) are also affected?
(6786391) /Jonathan A. Zdziarski <jonathan.zdziarski@micromuse.com>/(Ombruten)
6786276 2001-07-23 18:03 +0200  /42 rader/ Roman Drahtmueller <draht@suse.de>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-23  22:09  av Brevbäraren
Extern mottagare: Stephanie Thomas <customer.service@ssh.com>
Extern mottagare: bugtraq@securityfocus.com
Extern mottagare: security@suse.de
Mottagare: Bugtraq (import) <18273>
Kommentar till text 6775914 av Stephanie Thomas <customer.service@ssh.com>
Ärende: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: Roman Drahtmueller <draht@suse.de>
To: Stephanie Thomas <customer.service@ssh.com>,
 <bugtraq@securityfocus.com>, <security@suse.de>
Message-ID: <Pine.LNX.4.33.0107231751510.15489-100000@dent.suse.de>

> From: Stephanie Thomas <customer.service@ssh.com>
> To: bugtraq@securityfocus.com
> Date: Fri, 20 Jul 2001 17:34:02 -0700
> Subject: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
[...]
> PLATFORMS IMPACTED:
>
> Red Hat Linux 6.1 thru 7.1
> Solaris 2.6 thru 2.8
> HP-UX 10.20
> HP-UX 11.00
> Caldera Linux 2.4
> Suse Linux 6.4 thru 7.0

Numerous requests force an additional statement.

The ssh versions 3.* are not shipped with SuSE Linux, all versions of
the distribution.

Thanks to Frank Denis for pointing this out on bugtraq.

Since most of the mentioned systems are older than ssh-3.*, it seems
logical that these systems can't be affected by default. It should
have been mentioned that the platforms mentioned above are vulnerable
if the said version of ssh has been installed on them.  I wish for
more precision in future security announcements from ssh.com.

Roman Drahtmüller,
SuSE Security.
-- 
 -                                                                      -
| Roman Drahtmüller      <draht@suse.de> //          "Caution: Cape does |
  SuSE GmbH - Security           Phone: //       not enable user to fly."
| Nürnberg, Germany     +49-911-740530 // (Batman Costume warning label) |
 -                                                                      -
(6786276) /Roman Drahtmueller <draht@suse.de>/(Ombruten)
Kommentar i text 6787085 av Stephanie Thomas <customer.service@ssh.com>
6787085 2001-07-23 16:04 -0700  /81 rader/ Stephanie Thomas <customer.service@ssh.com>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-24  02:09  av Brevbäraren
Extern mottagare: Roman Drahtmueller <draht@suse.de>
Extern mottagare: bugtraq@securityfocus.com
Extern mottagare: security@suse.de
Mottagare: Bugtraq (import) <18283>
Kommentar till text 6786276 av Roman Drahtmueller <draht@suse.de>
Ärende: RE: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: "Stephanie Thomas" <customer.service@ssh.com>
To: "Roman Drahtmueller" <draht@suse.de>,
 <bugtraq@securityfocus.com>, <security@suse.de>
Message-ID: <FNEKKFMHLBAMAHPEHBLMMEAHCAAA.customer.service@ssh.com>

Hi Roman and Others,

Thanks for the feedback.

SSH Secure Shell 3.0.0 does not ship with any
of the operating systems mentioned, nor does the
announcement specify that it does. However, if a
user has explicitly installed SSH Secure Shell 3.0.0
on any of the listed operating systems, they are
vulnerable to this potential exploit.

Please understand that we receive many support requests
from administrators using either the commercial or
non-commercial versions of SSH Secure Shell on SuSe, Redhat,
Caldera, and other Linux versions - even though SSH Secure
Shell is not bundled these operating systems.  Because
of this, we wish to ensure that those users are aware that
this issue does affect them, and what they can do to
protect themselves.

We have listed those operating systems which we know
are vulnerable _with SSH Secure Shell 3.0.0 installed_.

My apologies if this was not clear in the original
announcement.

Best Regards,

Steph


-----Original Message-----
From: Roman Drahtmueller [mailto:draht@suse.de]
Sent: Monday, July 23, 2001 9:03 AM
To: Stephanie Thomas; bugtraq@securityfocus.com; security@suse.de
Subject: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0


> From: Stephanie Thomas <customer.service@ssh.com>
> To: bugtraq@securityfocus.com
> Date: Fri, 20 Jul 2001 17:34:02 -0700
> Subject: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
[...]
> PLATFORMS IMPACTED:
>
> Red Hat Linux 6.1 thru 7.1
> Solaris 2.6 thru 2.8
> HP-UX 10.20
> HP-UX 11.00
> Caldera Linux 2.4
> Suse Linux 6.4 thru 7.0

Numerous requests force an additional statement.

The ssh versions 3.* are not shipped with SuSE Linux, all versions of
the distribution.

Thanks to Frank Denis for pointing this out on bugtraq.

Since most of the mentioned systems are older than ssh-3.*, it seems
logical that these systems can't be affected by default. It should
have been mentioned that the platforms mentioned above are vulnerable
if the said version of ssh has been installed on them.  I wish for
more precision in future security announcements from ssh.com.

Roman Drahtmüller,
SuSE Security.
--
 -                                                                      -
| Roman Drahtmüller      <draht@suse.de> //          "Caution: Cape does |
  SuSE GmbH - Security           Phone: //       not enable user to fly."
| Nürnberg, Germany     +49-911-740530 // (Batman Costume warning label) |
 -                                                                      -
(6787085) /Stephanie Thomas <customer.service@ssh.com>/(Ombruten)
Kommentar i text 6790996 av Emre Yildirim <emre@vsrc.uab.edu>
6790996 2001-07-23 19:11 -0500  /26 rader/ Emre Yildirim <emre@vsrc.uab.edu>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-24  21:45  av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Extern kopiemottagare: customer.service@ssh.com
Mottagare: Bugtraq (import) <18310>
Kommentar till text 6787085 av Stephanie Thomas <customer.service@ssh.com>
Ärende: RE: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: "Emre Yildirim" <emre@vsrc.uab.edu>
To: <bugtraq@securityfocus.com>
Cc: <customer.service@ssh.com>
Message-ID: <1101.138.26.156.4.995933493.squirrel@www.vsrc.uab.edu>


> SSH Secure Shell 3.0.0 does not ship with any
> of the operating systems mentioned, nor does the
> announcement specify that it does. However, if a
> user has explicitly installed SSH Secure Shell 3.0.0
> on any of the listed operating systems, they are
> vulnerable to this potential exploit.
>

I don't want to drag this boring thread any longer, but in
your advisory, it stated that OpenBSD and NetBSD were
not vulnerable.  So...if I install SSH 3.0.0 on one of those
(even though the already come with openssh), ssh will not
be vulnerable to this bug?  Or will it?  I think that part
created a little confusion.


Cheers
(6790996) /Emre Yildirim <emre@vsrc.uab.edu>/-------
Kommentar i text 6795607 av Stephanie Thomas <customer.service@ssh.com>
6795607 2001-07-25 10:17 -0700  /47 rader/ Stephanie Thomas <customer.service@ssh.com>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-25  20:16  av Brevbäraren
Extern mottagare: Emre Yildirim <emre@vsrc.uab.edu>
Extern mottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <18336>
Kommentar till text 6790996 av Emre Yildirim <emre@vsrc.uab.edu>
Ärende: RE: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: "Stephanie Thomas" <customer.service@ssh.com>
To: "Emre Yildirim" <emre@vsrc.uab.edu>, <bugtraq@securityfocus.com>
Message-ID: <FNEKKFMHLBAMAHPEHBLMAEAJCAAA.customer.service@ssh.com>

Hi Emre,

We have tested OpenBSD and NetBSD, and have found
that they do not experience this vulnerability, 
even with ssh 3.0.0 installed.

This is most likely due to the method used to encrypt the 
password in /etc/passwd or /etc/shadow.

Best Regards,

Steph

-----Original Message-----
From: Emre Yildirim [mailto:emre@vsrc.uab.edu]
Sent: Monday, July 23, 2001 5:12 PM
To: bugtraq@securityfocus.com
Cc: customer.service@ssh.com
Subject: RE: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0



> SSH Secure Shell 3.0.0 does not ship with any
> of the operating systems mentioned, nor does the
> announcement specify that it does. However, if a
> user has explicitly installed SSH Secure Shell 3.0.0
> on any of the listed operating systems, they are
> vulnerable to this potential exploit.
>

I don't want to drag this boring thread any longer, but in
your advisory, it stated that OpenBSD and NetBSD were
not vulnerable.  So...if I install SSH 3.0.0 on one of those
(even though the already come with openssh), ssh will not
be vulnerable to this bug?  Or will it?  I think that part
created a little confusion.


Cheers
(6795607) /Stephanie Thomas <customer.service@ssh.com>/
Kommentar i text 6795731 av Eugene Medynskiy <eugenem@brainlink.com>
6795731 2001-07-25 14:30 -0500  /64 rader/ Eugene Medynskiy <eugenem@brainlink.com>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-25  20:51  av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <18338>
Kommentar till text 6795607 av Stephanie Thomas <customer.service@ssh.com>
Ärende: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: Eugene Medynskiy <eugenem@brainlink.com>
To: bugtraq@securityfocus.com
Message-ID: <3B5F1E42.7080505@brainlink.com>

This only affects systems that use crypt() to validate passwords. If
you  use md5 or blowfish instead (which OpenBSD, NetBSD, and Debian
Linux,  among others do by default) you should not be vulnerable.

-- 
-- Eugene Medynskiy

"You can't fight in here, this is the War Room!"

Stephanie Thomas wrote:

> Hi Emre,
> 
> We have tested OpenBSD and NetBSD, and have found
> that they do not experience this vulnerability, 
> even with ssh 3.0.0 installed.
> 
> This is most likely due to the method used to encrypt the 
> password in /etc/passwd or /etc/shadow.
> 
> Best Regards,
> 
> Steph
> 
> -----Original Message-----
> From: Emre Yildirim [mailto:emre@vsrc.uab.edu]
> Sent: Monday, July 23, 2001 5:12 PM
> To: bugtraq@securityfocus.com
> Cc: customer.service@ssh.com
> Subject: RE: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
> 
> 
> 
> 
>>SSH Secure Shell 3.0.0 does not ship with any
>>of the operating systems mentioned, nor does the
>>announcement specify that it does. However, if a
>>user has explicitly installed SSH Secure Shell 3.0.0
>>on any of the listed operating systems, they are
>>vulnerable to this potential exploit.
>>
>>
> 
> I don't want to drag this boring thread any longer, but in
> your advisory, it stated that OpenBSD and NetBSD were
> not vulnerable.  So...if I install SSH 3.0.0 on one of those
> (even though the already come with openssh), ssh will not
> be vulnerable to this bug?  Or will it?  I think that part
> created a little confusion.
> 
> 
> Cheers
> 
> 
> 
> 
>
(6795731) /Eugene Medynskiy <eugenem@brainlink.com>/(Ombruten)
6786792 2001-07-23 19:49 +0100  /28 rader/ Antonomasia <ant@notatla.demon.co.uk>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-24  00:12  av Brevbäraren
Extern mottagare: neldredge@hmc.edu
Extern kopiemottagare: aefrisch@lorentzian.com
Extern kopiemottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <18279>
Ärende: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
------------------------------------------------------------
From: ant@notatla.demon.co.uk (Antonomasia)
To: neldredge@hmc.edu
Cc: aefrisch@lorentzian.com, bugtraq@securityfocus.com
Message-ID: <20010723184924.A14B046A8@notatla.demon.co.uk>

From: Nate Eldredge <neldredge@hmc.edu>

> What's wrong with just using `strcmp' (i.e. no constraint at all)?  After
> all, what you want to know is just whether the two strings are identical,
> period.  And unless crypt() and /etc/shadow are both broken, it will stop 
> at the right place.  I realize it goes against the reflexive "only strn*
> functions are safe" idea, but that shouldn't substitute for thinking...

strcmp() with one argument as a crypt() output would be OK provided
any password aging information had first been removed from the field
in the comparison.

Code to detect accounts without passwords ought to check this too as
"::" is not the only value that is open to all.  "Essential System
Administration" 2nd Edition by Frisch falls down here on p344.

--
##############################################################
# Antonomasia   ant notatla.demon.co.uk                      #
# See http://www.notatla.demon.co.uk/                        #
##############################################################
(6786792) /Antonomasia <ant@notatla.demon.co.uk>/(Ombruten)