Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.58971
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2007:0540
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2007:0540.

OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. These
packages include the core files necessary for both the OpenSSH client and
server.

A flaw was found in the way the ssh server wrote account names to the audit
subsystem. An attacker could inject strings containing parts of audit
messages, which could possibly mislead or confuse audit log parsing tools.
(CVE-2007-3102)

A flaw was found in the way the OpenSSH server processes GSSAPI
authentication requests. When GSSAPI authentication was enabled in the
OpenSSH server, a remote attacker was potentially able to determine if a
username is valid. (CVE-2006-5052)

The following bugs in SELinux MLS (Multi-Level Security) support has also
been fixed in this update:

* It was sometimes not possible to select a SELinux role and level when
logging in using ssh.

* If the user obtained a non-default SELinux role or level, the role change
was not recorded in the audit subsystem.

* In some cases, on labeled networks, sshd allowed logins from level ranges
it should not allow.

The updated packages also contain experimental support for using private
keys stored in PKCS#11 tokens for client authentication. The support is
provided through the NSS (Network Security Services) library.

All users of openssh should upgrade to these updated packages, which
contain patches to correct these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2007-0540.html
http://www.redhat.com/security/updates/classification/#moderate

Risk factor : Medium

CVSS Score:
5.0

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2006-5052
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
BugTraq ID: 20245
http://www.securityfocus.com/bid/20245
Bugtraq: 20061005 rPSA-2006-0185-1 gnome-ssh-askpass openssh openssh-client openssh-server (Google Search)
http://www.securityfocus.com/archive/1/447861/100/200/threaded
Cert/CC Advisory: TA07-072A
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
http://security.gentoo.org/glsa/glsa-200611-06.xml
http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2
http://www.osvdb.org/29266
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10178
RedHat Security Advisories: RHSA-2006:0697
http://rhn.redhat.com/errata/RHSA-2006-0697.html
http://www.redhat.com/support/errata/RHSA-2007-0540.html
http://www.redhat.com/support/errata/RHSA-2007-0703.html
http://securitytracker.com/id?1016939
http://secunia.com/advisories/22158
http://secunia.com/advisories/22173
http://secunia.com/advisories/22495
http://secunia.com/advisories/22823
http://secunia.com/advisories/24479
http://secunia.com/advisories/27588
http://secunia.com/advisories/28320
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566
SuSE Security Announcement: SUSE-SA:2006:062 (Google Search)
http://www.novell.com/linux/security/advisories/2006_62_openssh.html
http://www.vupen.com/english/advisories/2007/0930
XForce ISS Database: openssh-gssapi-user-enumeration(29255)
https://exchange.xforce.ibmcloud.com/vulnerabilities/29255
Common Vulnerability Exposure (CVE) ID: CVE-2007-3102
BugTraq ID: 26097
http://www.securityfocus.com/bid/26097
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00214.html
https://bugzilla.redhat.com/show_bug.cgi?id=248059
http://osvdb.org/39214
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11124
http://www.redhat.com/support/errata/RHSA-2007-0555.html
http://www.redhat.com/support/errata/RHSA-2007-0737.html
http://secunia.com/advisories/27235
http://secunia.com/advisories/27590
http://secunia.com/advisories/28319
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.