[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200309172113.h8HLDg813835@porkchop.devel.redhat.com>
From: bugzilla at redhat.com (bugzilla@...hat.com)
Subject: [RHSA-2003:279-02] Updated OpenSSH packages fix potential vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ---------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Updated OpenSSH packages fix potential vulnerabilities
Advisory ID: RHSA-2003:279-02
Issue date: 2003-09-16
Updated on: 2003-09-17
Product: Red Hat Linux
Keywords:
Cross references:
Obsoletes: RHSA-2003:222
CVE Names: CAN-2003-0693 CAN-2003-0695 CAN-2003-0682
- ---------------------------------------------------------------------
1. Topic:
Updated OpenSSH packages are now available that fix bugs that may be
remotely exploitable.
[Updated 17 Sep 2003]
Updated packages are now available to fix additional buffer manipulation
problems which were fixed in OpenSSH 3.7.1. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2003-0695 to
these additional issues.
We have also included fixes from Solar Designer for some additional memory
bugs. The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0682 to these issues.
2. Relevant releases/architectures:
Red Hat Linux 7.1 - i386
Red Hat Linux 7.2 - i386, ia64
Red Hat Linux 7.3 - i386
Red Hat Linux 8.0 - i386
Red Hat Linux 9 - i386
3. Problem description:
OpenSSH is a suite of network connectivity tools that can be used to
establish encrypted connections between systems on a network and can
provide interactive login sessions and port forwarding, among other functions.
The OpenSSH team has announced a bug which affects the OpenSSH buffer
handling code. This bug has the potential of being remotely exploitable.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0693 to this issue.
All users of OpenSSH should immediately apply this update which contains a
backported fix for this issue.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
To update all RPMs for your particular architecture, run:
rpm -Fvh [filenames]
where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.
Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
If up2date fails to connect to Red Hat Network due to SSL Certificate
Errors, you need to install a version of the up2date client with an updated
certificate. The latest version of up2date is available from the Red Hat
FTP site and may also be downloaded directly from the RHN website:
https://rhn.redhat.com/help/latest-up2date.pxt
5. RPMs required:
Red Hat Linux 7.1:
SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/openssh-3.1p1-13.src.rpm
i386:
ftp://updates.redhat.com/7.1/en/os/i386/openssh-3.1p1-13.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/openssh-clients-3.1p1-13.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/openssh-server-3.1p1-13.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/openssh-askpass-3.1p1-13.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/openssh-askpass-gnome-3.1p1-13.i386.rpm
Red Hat Linux 7.2:
SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/openssh-3.1p1-14.src.rpm
i386:
ftp://updates.redhat.com/7.2/en/os/i386/openssh-3.1p1-14.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/openssh-clients-3.1p1-14.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/openssh-server-3.1p1-14.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/openssh-askpass-3.1p1-14.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/openssh-askpass-gnome-3.1p1-14.i386.rpm
ia64:
ftp://updates.redhat.com/7.2/en/os/ia64/openssh-3.1p1-14.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/openssh-clients-3.1p1-14.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/openssh-server-3.1p1-14.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/openssh-askpass-3.1p1-14.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/openssh-askpass-gnome-3.1p1-14.ia64.rpm
Red Hat Linux 7.3:
SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/openssh-3.1p1-14.src.rpm
i386:
ftp://updates.redhat.com/7.3/en/os/i386/openssh-3.1p1-14.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/openssh-clients-3.1p1-14.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/openssh-server-3.1p1-14.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/openssh-askpass-3.1p1-14.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/openssh-askpass-gnome-3.1p1-14.i386.rpm
Red Hat Linux 8.0:
SRPMS:
ftp://updates.redhat.com/8.0/en/os/SRPMS/openssh-3.4p1-7.src.rpm
i386:
ftp://updates.redhat.com/8.0/en/os/i386/openssh-3.4p1-7.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/openssh-clients-3.4p1-7.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/openssh-server-3.4p1-7.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/openssh-askpass-3.4p1-7.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/openssh-askpass-gnome-3.4p1-7.i386.rpm
Red Hat Linux 9:
SRPMS:
ftp://updates.redhat.com/9/en/os/SRPMS/openssh-3.5p1-11.src.rpm
i386:
ftp://updates.redhat.com/9/en/os/i386/openssh-3.5p1-11.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/openssh-clients-3.5p1-11.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/openssh-server-3.5p1-11.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/openssh-askpass-3.5p1-11.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/openssh-askpass-gnome-3.5p1-11.i386.rpm
6. Verification:
MD5 sum Package Name
- --------------------------------------------------------------------------
6cb8f6ed9b09b1f3f1f0564b9b1e6b55 7.1/en/os/SRPMS/openssh-3.1p1-13.src.rpm
9fd288589f124600a115c4540b967546 7.1/en/os/i386/openssh-3.1p1-13.i386.rpm
74d1258698990ab13ae3a6654c2ec076 7.1/en/os/i386/openssh-askpass-3.1p1-13.i386.rpm
c451a89e639305fc9b45ebeb22bee53c 7.1/en/os/i386/openssh-askpass-gnome-3.1p1-13.i386.rpm
46db395a09d70a04f78f2f99d7dee598 7.1/en/os/i386/openssh-clients-3.1p1-13.i386.rpm
a90461d8ed836b05db4140bdb334853d 7.1/en/os/i386/openssh-server-3.1p1-13.i386.rpm
2ffa9565705436314cf9b6dedcb30501 7.2/en/os/SRPMS/openssh-3.1p1-14.src.rpm
621313655d8060a0454bd9ea24f2ecc4 7.2/en/os/i386/openssh-3.1p1-14.i386.rpm
14c946af1e46502e65fd2a2e16e720af 7.2/en/os/i386/openssh-askpass-3.1p1-14.i386.rpm
5d21951446986c2c9273b74bc6f24d42 7.2/en/os/i386/openssh-askpass-gnome-3.1p1-14.i386.rpm
e60ebf607207738d0b06a634c872b51e 7.2/en/os/i386/openssh-clients-3.1p1-14.i386.rpm
36f8fcd31f88ddc370fdad1d05ab2faa 7.2/en/os/i386/openssh-server-3.1p1-14.i386.rpm
e05d229d860a745e3deb6919657608e1 7.2/en/os/ia64/openssh-3.1p1-14.ia64.rpm
40052191b71767409de985655a6ef15d 7.2/en/os/ia64/openssh-askpass-3.1p1-14.ia64.rpm
f65ae2b19d3925c561e3f46a655e9933 7.2/en/os/ia64/openssh-askpass-gnome-3.1p1-14.ia64.rpm
1559e98e2067218bc76a31fd92027386 7.2/en/os/ia64/openssh-clients-3.1p1-14.ia64.rpm
b2105a311ac26351368928af2e3573ca 7.2/en/os/ia64/openssh-server-3.1p1-14.ia64.rpm
2ffa9565705436314cf9b6dedcb30501 7.3/en/os/SRPMS/openssh-3.1p1-14.src.rpm
621313655d8060a0454bd9ea24f2ecc4 7.3/en/os/i386/openssh-3.1p1-14.i386.rpm
14c946af1e46502e65fd2a2e16e720af 7.3/en/os/i386/openssh-askpass-3.1p1-14.i386.rpm
5d21951446986c2c9273b74bc6f24d42 7.3/en/os/i386/openssh-askpass-gnome-3.1p1-14.i386.rpm
e60ebf607207738d0b06a634c872b51e 7.3/en/os/i386/openssh-clients-3.1p1-14.i386.rpm
36f8fcd31f88ddc370fdad1d05ab2faa 7.3/en/os/i386/openssh-server-3.1p1-14.i386.rpm
47f4de9e51a25484b1e0cac9f9b4676c 8.0/en/os/SRPMS/openssh-3.4p1-7.src.rpm
422872397649f06ae7953ef00ffcc319 8.0/en/os/i386/openssh-3.4p1-7.i386.rpm
e4f58b8ae54132ef930c6dbe852fa581 8.0/en/os/i386/openssh-askpass-3.4p1-7.i386.rpm
b6ea35700c46e03a4012a7f1dcef5c6d 8.0/en/os/i386/openssh-askpass-gnome-3.4p1-7.i386.rpm
1e4af9a4cfb4e2b13858183758bf7d11 8.0/en/os/i386/openssh-clients-3.4p1-7.i386.rpm
887c34bbbd631b8093c74062bb641120 8.0/en/os/i386/openssh-server-3.4p1-7.i386.rpm
e08da954970897a6617fa1862232afe6 9/en/os/SRPMS/openssh-3.5p1-11.src.rpm
8598eddc12b2f06c34464a24d549d9af 9/en/os/i386/openssh-3.5p1-11.i386.rpm
48b23604aad9ecebb9f55807c562491d 9/en/os/i386/openssh-askpass-3.5p1-11.i386.rpm
e64a662054f7efeb6a0172fdadc26c92 9/en/os/i386/openssh-askpass-gnome-3.5p1-11.i386.rpm
922cf88933eeda965d6ad7534051c17e 9/en/os/i386/openssh-clients-3.5p1-11.i386.rpm
f58b37fc0290039448c450c3eb9630df 9/en/os/i386/openssh-server-3.5p1-11.i386.rpm
These packages are GPG signed by Red Hat for security. Our key is
available from https://www.redhat.com/security/keys.html
You can verify each package with the following command:
rpm --checksig -v <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
md5sum <filename>
7. References:
http://www.openssh.com/txt/buffer.adv
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0693
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0695
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0682
8. Contact:
The Red Hat security contact is <secalert@...hat.com>. More contact
details at https://www.redhat.com/solutions/security/news/contact.html
Copyright 2003 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQE/aM6DXlSAg2UNWIIRAs/0AKCt/aNFHj64IX2lCycyZID8NER6oACglzGI
JKIPfQGIXK0gb4YOLCbgvbI=
=Ad+P
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists