TUCoPS :: Unix :: General :: n-158.txt


TUCoPS :: Unix :: General :: n-158.txt

CERT Portable OpenSSH server PAM vulnerability (CIAC N-158)

 __________________________________________________________
 The U.S. Department of Energy
 Computer Incident Advisory Capability
 ___ __ __ _ ___
 / | /_\ /
 \___ __|__ / \ \___
 __________________________________________________________
 INFORMATION BULLETIN
 CERT: Portable OpenSSH server PAM Vulnerability
 [Vulnerability Note VU#209807]
September 30, 2003 18:00 GMT Number N-158
______________________________________________________________________________
PROBLEM: A vulnerability in the Portable OpenSSH server that may corrupt 
 the PAM conversion stack. 
PLATFORM: OpenSSH 3.7.1p1 (portable) 
DAMAGE: The complete impact of this vulnerability is not yet known, but 
 may lead to privilege escalation, or a denial of service. 
SOLUTION: Change the config file or apply upgrades. 
 (Note--changing the config file for CIAC N-157 CERT OpenSSH 
 PAM challenge authentication failure, fixes this.) 
______________________________________________________________________________
VULNERABILITY The risk is MEDIUM. The complete impact of this vulnerability 
ASSESSMENT: is not yet known, but may lead to privilege escalation, or a 
 denial of service. 
______________________________________________________________________________
LINKS: 
 CIAC BULLETIN: http://www.ciac.org/ciac/bulletins/n-158.shtml 
 ORIGINAL BULLETIN: http://www.kb.cert.org/vuls/id/209807 
______________________________________________________________________________
[***** Start Vulnerability Note VU#209807 *****]
Vulnerability Note VU#209807
Portable OpenSSH server PAM conversion stack corruption
Overview
There is a vulnerability in the Portable OpenSSH server that may corrupt the PAM 
conversion stack. 
I. Description
The Portable OpenSSH server contains a vulnerability that may permit an attacker to 
corrupt the PAM conversion stack. Versions 3.7p1 and 3.7.1p1 are affected. Note that 
the OpenBSD-specific releases are not affected by this issue. 
II. Impact
The complete impact of this vulnerability is not yet known, but may lead to privilege 
escalation, or a denial of service.
III. Solution
OpenSSH has announced version 3.7.1p2 to resolve this issue. 
This issue can be mitigated by not using PAM. Set "UsePAM no" in sshd_config. 
Systems Affected
Vendor Status Date Updated 
OpenSSH Vulnerable 24-Sep-2003 
References
http://marc.theaimsgroup.com/?l=openbsd-misc&m=106432248311634&w=2
http://www.openssh.com/txt/sshpam.adv 
Credit
Thanks to OpenSSH for reporting this vulnerability. 
This document was written by Jason A Rafail. 
Other Information
Date Public 09/23/2003 
Date First Published 09/24/2003 11:06:09 AM 
Date Last Updated 09/24/2003 
CERT Advisory 
CVE Name CAN-2003-0787 
Metric 1.50 
Document Revision 2 
[***** End Vulnerability Note VU#209807 *****]

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH

AltStyle によって変換されたページ (->オリジナル) /