8216586 2002-03-29 11:56 -0800 /182 rader/ <security@caldera.com> Sänt av: joel@lysator.liu.se Importerad: 2002-03-29 22:51 av Brevbäraren Extern mottagare: bugtraq@securityfocus.com Extern mottagare: announce@lists.caldera.com Extern mottagare: security-alerts@linuxsecurity.com Mottagare: Bugtraq (import) <21641> Ärende: Security Update: [CSSA-2002-012.0] Linux: OpenSSH channel code vulnerability ------------------------------------------------------------ From: security@caldera.com To: bugtraq@securityfocus.com, announce@lists.caldera.com, security-alerts@linuxsecurity.com Message-ID: <20020329115623.K25454@caldera.com> To: bugtraq@securityfocus.com announce@lists.caldera.com security-alerts@linuxsecurity.com ______________________________________________________________________________ Caldera International, Inc. Security Advisory Subject: Linux: OpenSSH channel code vulnerability Advisory number: CSSA-2002-012.0 Issue date: 2002, March 28 Cross reference: ______________________________________________________________________________ 1. Problem Description A bug exists in the channel code of OpenSSH versions 2.0 though 3.0.2. Existing users can use this bug to gain root privileges. The ability to exploit this vulnerability without an existing user account has not yet been proven, but it is considered possible. A malicious ssh server could also use this bug to exploit a connecting vulnerable client. 2. Vulnerable Supported Versions System Package ----------------------------------------------------------- OpenLinux Server 3.1 All packages previous to openssh-2.9p2 OpenLinux Workstation 3.1 All packages previous to openssh-2.9p2 OpenLinux Server 3.1.1 All packages previous to openssh-2.9.9p2 OpenLinux Workstation All packages previous to 3.1.1 openssh-2.9.9p2 3. Solution Workaround none The proper solution is to upgrade to the latest packages. 4. OpenLinux 3.1 Server 4.1 Location of Fixed Packages The upgrade packages can be found on Caldera's FTP site at: ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/RPMS The corresponding source code package can be found at: ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/SRPMS 4.2 Verification f628846edca7e40cebf0174d4a02abb9 RPMS/openssh-2.9p2-5.i386.rpm 4.3 Installing Fixed Packages Upgrade the affected packages with the following commands: rpm -Fvh openssh-2.9p2-5.i386.rpm 5. OpenLinux 3.1 Workstation 5.1 Location of Fixed Packages The upgrade packages can be found on Caldera's FTP site at: ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/RPMS The corresponding source code package can be found at: ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/SRPMS 5.2 Verification f628846edca7e40cebf0174d4a02abb9 RPMS/openssh-2.9p2-5.i386.rpm 5.3 Installing Fixed Packages Upgrade the affected packages with the following commands: rpm -Fvh openssh-2.9p2-5.i386.rpm 6. OpenLinux 3.1.1 Server 6.1 Location of Fixed Packages The upgrade packages can be found on Caldera's FTP site at: ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/RPMS The corresponding source code package can be found at: ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/SRPMS 6.2 Verification 523a21268ec04feb84feaf8a8b41bb3c RPMS/openssh-2.9.9p2-3.i386.rpm 6.3 Installing Fixed Packages Upgrade the affected packages with the following commands: rpm -Fvh openssh-2.9.9p2-3.i386.rpm 7. OpenLinux 3.1.1 Workstation 7.1 Location of Fixed Packages The upgrade packages can be found on Caldera's FTP site at: ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/RPMS The corresponding source code package can be found at: ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/SRPMS 7.2 Verification 523a21268ec04feb84feaf8a8b41bb3c RPMS/openssh-2.9.9p2-3.i386.rpm 7.3 Installing Fixed Packages Upgrade the affected packages with the following commands: rpm -Fvh openssh-2.9.9p2-3.i386.rpm 8. References Specific references for this advisory: none Caldera OpenLinux security resources: http://www.caldera.com/support/security/index.html Caldera UNIX security resources: http://stage.caldera.com/support/security/ This security fix closes Caldera incidents sr861333, fz520313, erg711982. 9. Disclaimer Caldera International, Inc. is not responsible for the misuse of any of the information we provide on this website and/or through our security advisories. Our advisories are a service to our customers intended to promote secure installation and use of Caldera International products. 10. Acknowledgements Joost Pol <joost@pine.nl> discovered and researched this vulnerability. ______________________________________________________________________________ (8216586) / <security@caldera.com>/-------(Ombruten) Bilaga (application/pgp-signature) i text 8216587 8216587 2002-03-29 11:56 -0800 /10 rader/ <security@caldera.com> Importerad: 2002-03-29 22:51 av Brevbäraren Extern mottagare: bugtraq@securityfocus.com Extern mottagare: announce@lists.caldera.com Extern mottagare: security-alerts@linuxsecurity.com Mottagare: Bugtraq (import) <21642> Bilaga (text/plain) till text 8216586 Ärende: Bilaga till: Security Update: [CSSA-2002-012.0] Linux: OpenSSH channel code vulnerability ------------------------------------------------------------ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (SCO_SV) Comment: For info see http://www.gnupg.org iEYEARECAAYFAjykxucACgkQbluZssSXDTEoQgCeLDNK8rwOMbsTXbkWFDTELBSj 5sEAoNTYsFidhlmjixORdQClbJmODc8l =Mj7n -----END PGP SIGNATURE----- (8216587) / <security@caldera.com>/-----------------