Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.61404
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2008:0855
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory RHSA-2008:0855.

OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation.

Last week Red Hat detected an intrusion on certain of its computer systems
and took immediate action. While the investigation into the intrusion is
on-going, our initial focus was to review and test the distribution
channel we use with our customers, Red Hat Network (RHN) and its associated
security measures. Based on these efforts, we remain highly confident that
our systems and processes prevented the intrusion from compromising RHN or
the content distributed via RHN and accordingly believe that customers who
keep their systems updated using Red Hat Network are not at risk. We are
issuing this alert primarily for those who may obtain Red Hat binary
packages via channels other than those of official Red Hat subscribers.

In connection with the incident, the intruder was able to sign a small
number of OpenSSH packages relating only to Red Hat Enterprise Linux 4
(i386 and x86_64 architectures only) and Red Hat Enterprise Linux 5 (x86_64
architecture only). As a precautionary measure, we are releasing an
updated version of these packages, and have published a list of the
tampered packages and how to detect them at
http://www.redhat.com/security/data/openssh-blacklist.html

To reiterate, our processes and efforts to date indicate that packages
obtained by Red Hat Enterprise Linux subscribers via Red Hat Network are
not at risk.

These packages also fix a low severity flaw in the way ssh handles X11
cookies when creating X11 forwarding connections. When ssh was unable to
create untrusted cookie, ssh used a trusted cookie instead, possibly
allowing the administrative user of a untrusted remote server, or untrusted
application run on the remote server, to gain unintended access to a users
local X server. (CVE-2007-4752)

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2008-0855.html
http://www.redhat.com/security/data/openssh-blacklist.html
http://www.redhat.com/security/updates/classification/#critical

Risk factor : High

CVSS Score:
7.5

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-4752
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
BugTraq ID: 25628
http://www.securityfocus.com/bid/25628
Bugtraq: 20070917 FLEA-2007-0055-1 openssh openssh-client openssh-server gnome-ssh-askpass (Google Search)
http://www.securityfocus.com/archive/1/479760/100/0/threaded
Bugtraq: 20071115 Re: HPSBUX02287 SSRT071485 rev.1 - HP-UX Running HP Secure Shell, Remotely Gain Extended Privileges (Google Search)
http://www.securityfocus.com/archive/1/483748/100/200/threaded
Debian Security Information: DSA-1576 (Google Search)
http://www.debian.org/security/2008/dsa-1576
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00214.html
http://security.gentoo.org/glsa/glsa-200711-02.xml
HPdes Security Advisory: HPSBUX02287
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085
HPdes Security Advisory: SSRT071485
http://www.mandriva.com/security/advisories?name=MDKSA-2007:236
https://bugzilla.redhat.com/show_bug.cgi?id=280471
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10809
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5599
http://www.redhat.com/support/errata/RHSA-2008-0855.html
http://secunia.com/advisories/27399
http://secunia.com/advisories/29420
http://secunia.com/advisories/30249
http://secunia.com/advisories/31575
http://secunia.com/advisories/32241
http://securityreason.com/securityalert/3126
SuSE Security Announcement: SUSE-SR:2007:022 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html
http://www.ubuntu.com/usn/usn-566-1
http://www.vupen.com/english/advisories/2007/3156
http://www.vupen.com/english/advisories/2008/0924/references
http://www.vupen.com/english/advisories/2008/2821
XForce ISS Database: openssh-x11cookie-privilege-escalation(36637)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36637
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.