![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.59014 |
Kategorie: | Slackware Local Security Checks |
Titel: | Slackware: Security Advisory (SSA:2007-255-01) |
Zusammenfassung: | The remote host is missing an update for the 'openssh' package(s) announced via the SSA:2007-255-01 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'openssh' package(s) announced via the SSA:2007-255-01 advisory. Vulnerability Insight: New openssh packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, and 12.0 to fix a possible security issue. This version should also provide increased performance with certain ciphers. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database: [link moved to references] Here are the details from the Slackware 12.0 ChangeLog: +--------------------------+ patches/packages/openssh-4.7p1-i486-1_slack12.0.tgz: Upgraded to openssh-4.7p1. From the OpenSSH release notes: 'Security bugs resolved in this release: Prevent ssh(1) from using a trusted X11 cookie if creation of an untrusted cookie fails, found and fixed by Jan Pechanec.' While it's fair to say that we here at Slackware don't see how this could be leveraged to compromise a system, a) the OpenSSH people (who presumably understand the code better) characterize this as a security bug, b) it has been assigned a CVE entry, and c) OpenSSH is one of the most commonly used network daemons. Better safe than sorry. More information should appear here eventually: [link moved to references] (* Security fix *) +--------------------------+ Affected Software/OS: 'openssh' package(s) on Slackware 8.1, Slackware 9.0, Slackware 9.1, Slackware 10.0, Slackware 10.1, Slackware 10.2, Slackware 11.0, Slackware 12.0. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2007-4752 http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html BugTraq ID: 25628 http://www.securityfocus.com/bid/25628 Bugtraq: 20070917 FLEA-2007-0055-1 openssh openssh-client openssh-server gnome-ssh-askpass (Google Search) http://www.securityfocus.com/archive/1/479760/100/0/threaded Bugtraq: 20071115 Re: HPSBUX02287 SSRT071485 rev.1 - HP-UX Running HP Secure Shell, Remotely Gain Extended Privileges (Google Search) http://www.securityfocus.com/archive/1/483748/100/200/threaded Debian Security Information: DSA-1576 (Google Search) http://www.debian.org/security/2008/dsa-1576 https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00214.html http://security.gentoo.org/glsa/glsa-200711-02.xml HPdes Security Advisory: HPSBUX02287 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085 HPdes Security Advisory: SSRT071485 http://www.mandriva.com/security/advisories?name=MDKSA-2007:236 https://bugzilla.redhat.com/show_bug.cgi?id=280471 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10809 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5599 http://www.redhat.com/support/errata/RHSA-2008-0855.html http://secunia.com/advisories/27399 http://secunia.com/advisories/29420 http://secunia.com/advisories/30249 http://secunia.com/advisories/31575 http://secunia.com/advisories/32241 http://securityreason.com/securityalert/3126 SuSE Security Announcement: SUSE-SR:2007:022 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html http://www.ubuntu.com/usn/usn-566-1 http://www.vupen.com/english/advisories/2007/3156 http://www.vupen.com/english/advisories/2008/0924/references http://www.vupen.com/english/advisories/2008/2821 XForce ISS Database: openssh-x11cookie-privilege-escalation(36637) https://exchange.xforce.ibmcloud.com/vulnerabilities/36637 |
Copyright | Copyright (C) 2012 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |