lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1GUsUa-00025d-SJ@mercury.mandriva.com>
Date: Tue,  3 Oct 2006 16:12:00 -0600
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDKSA-2006:179 ] - Updated openssh packages fix DoS vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:179
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : openssh
 Date    : October 3, 2006
 Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0,
           Multi Network Firewall 2.0
 _______________________________________________________________________
 
 Problem Description:
 
 Tavis Ormandy of the Google Security Team discovered a Denial of
 Service vulnerability in the SSH protocol version 1 CRC compensation
 attack detector.  This could allow a remote unauthenticated attacker to
 trigger excessive CPU utilization by sending a specially crafted SSH
 message, which would then deny ssh services to other users or processes
 (CVE-2006-4924, CVE-2006-4925).  Please note that Mandriva ships with
 only SSH protocol version 2 enabled by default.

 Next, an unsafe signal handler was found by Mark Dowd.  This signal
 handler was vulnerable to a race condition that could be exploited to
 perform a pre-authentication DoS, and theoretically a
 pre-authentication remote code execution in the case where some
 authentication methods like GSSAPI are enabled (CVE-2006-5051).

 Updated packages have been patched to correct this issue.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4925
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 1280b30b3520a9ca5c2e6a716a770a0c  2006.0/i586/openssh-4.3p1-0.3.20060mdk.i586.rpm
 007b28a957c4537d6ed196d2b2367c1e  2006.0/i586/openssh-askpass-4.3p1-0.3.20060mdk.i586.rpm
 280b2c0b27ef2387110d363493be892f  2006.0/i586/openssh-askpass-gnome-4.3p1-0.3.20060mdk.i586.rpm
 3a41abc407c20928f672223c67d06c36  2006.0/i586/openssh-clients-4.3p1-0.3.20060mdk.i586.rpm
 063589a511985d4127e03c349fa23330  2006.0/i586/openssh-server-4.3p1-0.3.20060mdk.i586.rpm 
 6f11187f048ef296607c54c1c92e7c24  2006.0/SRPMS/openssh-4.3p1-0.3.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 68bc6ad235e0534bc57e180b90c33bdb  2006.0/x86_64/openssh-4.3p1-0.3.20060mdk.x86_64.rpm
 d0668a2d76eb927afcaa4897fc509f91  2006.0/x86_64/openssh-askpass-4.3p1-0.3.20060mdk.x86_64.rpm
 502b3088f7f55d3de57b2278b5452a5a  2006.0/x86_64/openssh-askpass-gnome-4.3p1-0.3.20060mdk.x86_64.rpm
 2551d84521716a9b6702a98b9d121b9d  2006.0/x86_64/openssh-clients-4.3p1-0.3.20060mdk.x86_64.rpm
 c8627d7e04e87c1e5bed7d0b744b2ad2  2006.0/x86_64/openssh-server-4.3p1-0.3.20060mdk.x86_64.rpm 
 6f11187f048ef296607c54c1c92e7c24  2006.0/SRPMS/openssh-4.3p1-0.3.20060mdk.src.rpm

 Mandriva Linux 2007.0:
 9687bdb4f2865c2765da0f01efda87ef  2007.0/i586/openssh-4.3p2-12.1mdv2007.0.i586.rpm
 40f80b906c0e9ec5d2d6622ce7efc3fd  2007.0/i586/openssh-askpass-4.3p2-12.1mdv2007.0.i586.rpm
 b50bae14a353fdd3ca632096467a51cd  2007.0/i586/openssh-askpass-common-4.3p2-12.1mdv2007.0.i586.rpm
 0d393f5af4f97c0ca2073c3f11628a40  2007.0/i586/openssh-askpass-gnome-4.3p2-12.1mdv2007.0.i586.rpm
 084d0fa10aa7daa1aaea59cb2efc9494  2007.0/i586/openssh-clients-4.3p2-12.1mdv2007.0.i586.rpm
 07f0a46845c178b78549c0734074407f  2007.0/i586/openssh-server-4.3p2-12.1mdv2007.0.i586.rpm 
 c9ccf40372c7c2b0eca968aec9f9385d  2007.0/SRPMS/openssh-4.3p2-12.1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 a1ed25a9f53038434574b3ce921eac1a  2007.0/x86_64/openssh-4.3p2-12.1mdv2007.0.x86_64.rpm
 d9acf43a28f105d80fcd7a12535efdda  2007.0/x86_64/openssh-askpass-4.3p2-12.1mdv2007.0.x86_64.rpm
 ed6488abb9c621dab762307136493969  2007.0/x86_64/openssh-askpass-common-4.3p2-12.1mdv2007.0.x86_64.rpm
 ef48a28c45ec44dc1f20eb0ee26f4877  2007.0/x86_64/openssh-askpass-gnome-4.3p2-12.1mdv2007.0.x86_64.rpm
 80c7ee2ccb6ac35fe1b893cb58b092cd  2007.0/x86_64/openssh-clients-4.3p2-12.1mdv2007.0.x86_64.rpm
 217eb2fbf7574aa34a592e54d527f8dd  2007.0/x86_64/openssh-server-4.3p2-12.1mdv2007.0.x86_64.rpm 
 c9ccf40372c7c2b0eca968aec9f9385d  2007.0/SRPMS/openssh-4.3p2-12.1mdv2007.0.src.rpm

 Corporate 3.0:
 08ee3d3de53563481a748d8b4d9f5e5b  corporate/3.0/i586/openssh-4.3p1-0.2.C30mdk.i586.rpm
 bb472724a2e1afce4b2d526f75d65d3e  corporate/3.0/i586/openssh-askpass-4.3p1-0.2.C30mdk.i586.rpm
 cdcf5e37768032e2c6599d219493db0c  corporate/3.0/i586/openssh-askpass-gnome-4.3p1-0.2.C30mdk.i586.rpm
 1909a018d6883df234a2bb41072a839b  corporate/3.0/i586/openssh-clients-4.3p1-0.2.C30mdk.i586.rpm
 fc516bf57f9faf0168fef9638f1f7546  corporate/3.0/i586/openssh-server-4.3p1-0.2.C30mdk.i586.rpm 
 b6c94995c4c1408a1d72b6fb1956e7c1  corporate/3.0/SRPMS/openssh-4.3p1-0.2.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 dab1069ffd0d206b230872ce11d6ef32  corporate/3.0/x86_64/openssh-4.3p1-0.2.C30mdk.x86_64.rpm
 940a582fce6836589755ceea2d494421  corporate/3.0/x86_64/openssh-askpass-4.3p1-0.2.C30mdk.x86_64.rpm
 ee2543c6210ce8294e586305aa950c0e  corporate/3.0/x86_64/openssh-askpass-gnome-4.3p1-0.2.C30mdk.x86_64.rpm
 236f5b3229aebf958a7726f861f5c279  corporate/3.0/x86_64/openssh-clients-4.3p1-0.2.C30mdk.x86_64.rpm
 245fa68997db318e68b27c1d47a19219  corporate/3.0/x86_64/openssh-server-4.3p1-0.2.C30mdk.x86_64.rpm 
 b6c94995c4c1408a1d72b6fb1956e7c1  corporate/3.0/SRPMS/openssh-4.3p1-0.2.C30mdk.src.rpm

 Corporate 4.0:
 cd934818457b0e688c5e49e16e022e03  corporate/4.0/i586/openssh-4.3p1-0.3.20060mlcs4.i586.rpm
 3d14fc47de98f81e803755f80df948c1  corporate/4.0/i586/openssh-askpass-4.3p1-0.3.20060mlcs4.i586.rpm
 03f2d3a6089b5a2d5abcf3ceffeecdc1  corporate/4.0/i586/openssh-askpass-gnome-4.3p1-0.3.20060mlcs4.i586.rpm
 37a2a56723f5dc119acce62df2759749  corporate/4.0/i586/openssh-clients-4.3p1-0.3.20060mlcs4.i586.rpm
 331331d9843f490c6e98c28d54b42ca9  corporate/4.0/i586/openssh-server-4.3p1-0.3.20060mlcs4.i586.rpm 
 988d0f895a34d6a71e69f7ec12bd45f0  corporate/4.0/SRPMS/openssh-4.3p1-0.3.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 5bdd94f5242c68fe0b490c13cbd08ea0  corporate/4.0/x86_64/openssh-4.3p1-0.3.20060mlcs4.x86_64.rpm
 48874aea14500ca90da22dcdfab029f8  corporate/4.0/x86_64/openssh-askpass-4.3p1-0.3.20060mlcs4.x86_64.rpm
 4f7a3fc780511ead79932bbdf5e64b61  corporate/4.0/x86_64/openssh-askpass-gnome-4.3p1-0.3.20060mlcs4.x86_64.rpm
 d99aa2e584d3e58cf40e49c99d9ce3a6  corporate/4.0/x86_64/openssh-clients-4.3p1-0.3.20060mlcs4.x86_64.rpm
 6a622455fc895b7b30d049d799207f19  corporate/4.0/x86_64/openssh-server-4.3p1-0.3.20060mlcs4.x86_64.rpm 
 988d0f895a34d6a71e69f7ec12bd45f0  corporate/4.0/SRPMS/openssh-4.3p1-0.3.20060mlcs4.src.rpm

 Multi Network Firewall 2.0:
 6da5f9bf7f28e8017133a4f5fa72651f  mnf/2.0/i586/openssh-4.3p1-0.2.M20mdk.i586.rpm
 3b5fce9c7d8a67a179bb40c3c537f160  mnf/2.0/i586/openssh-askpass-4.3p1-0.2.M20mdk.i586.rpm
 7ff70b823d0fa18677447a90bb3ea503  mnf/2.0/i586/openssh-askpass-gnome-4.3p1-0.2.M20mdk.i586.rpm
 434e7b3885a37ce4d72ed7f2fd3d9342  mnf/2.0/i586/openssh-clients-4.3p1-0.2.M20mdk.i586.rpm
 1772c26f342a5d8b00c3894cdf6ad514  mnf/2.0/i586/openssh-server-4.3p1-0.2.M20mdk.i586.rpm 
 2d96693d80c25155b97272596da9aabe  mnf/2.0/SRPMS/openssh-4.3p1-0.2.M20mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFFIrMhmqjQ0CJFipgRAgorAKCOcYilSXP6Kb9+YvEPo+cCQqNU4ACg34yT
q/lGk643+mKj9Xi4CNcCHS8=
=ztdc
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ