English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75096 CVE descriptions
and 39644 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.57496
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-355-1 (openssh)
Summary:Ubuntu USN-355-1 (openssh)
Description:
The remote host is missing an update to openssh
announced via advisory USN-355-1.

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

Tavis Ormandy discovered that the SSH daemon did not properly handle
authentication packets with duplicated blocks. By sending specially
crafted packets, a remote attacker could exploit this to cause the ssh
daemon to drain all available CPU resources until the login grace time
expired. (CVE-2006-4924)

Mark Dowd discovered a race condition in the server's signal handling.
A remote attacker could exploit this to crash the server.
(CVE-2006-5051)

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
openssh-server 1:3.9p1-1ubuntu2.3

Ubuntu 5.10:
openssh-server 1:4.1p1-7ubuntu4.2

Ubuntu 6.06 LTS:
openssh-server 1:4.2p1-7ubuntu3.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-355-1

Risk factor : Critical
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-4924
Bugtraq: 20060927 rPSA-2006-0174-1 gnome-ssh-askpass openssh openssh-client openssh-server (Google Search)
http://www.securityfocus.com/archive/1/archive/1/447153/100/0/threaded
http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=115939141729160&w=2
http://www-unix.globus.org/mail_archive/security-announce/2007/04/msg00000.html
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207955
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
Debian Security Information: DSA-1189 (Google Search)
http://www.debian.org/security/2006/dsa-1189
Debian Security Information: DSA-1212 (Google Search)
http://www.debian.org/security/2006/dsa-1212
FreeBSD Security Advisory: FreeBSD-SA-06:22
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:22.openssh.asc
http://security.freebsd.org/advisories/FreeBSD-SA-06%3A22.openssh.asc
http://security.gentoo.org/glsa/glsa-200609-17.xml
http://security.gentoo.org/glsa/glsa-200611-06.xml
HPdes Security Advisory: HPSBUX02178
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00815112
HPdes Security Advisory: SSRT061267
http://www.mandriva.com/security/advisories?name=MDKSA-2006:179
OpenBSD Security Advisory: [2.9] 015: SECURITY FIX: October 12, 2006
http://www.openbsd.org/errata.html#ssh
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.022-openssh.html
http://www.redhat.com/support/errata/RHSA-2006-0698.html
http://www.redhat.com/support/errata/RHSA-2006-0697.html
SCO Security Bulletin: SCOSA-2008.2
ftp://ftp.sco.com/pub/unixware7/714/security/p534336/p534336.txt
SGI Security Advisory: 20061001-01-P
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102962-1
SuSE Security Announcement: SUSE-SR:2006:024 (Google Search)
http://www.novell.com/linux/security/advisories/2006_24_sr.html
SuSE Security Announcement: SUSE-SA:2006:062 (Google Search)
http://www.novell.com/linux/security/advisories/2006_62_openssh.html
http://www.trustix.org/errata/2006/0054
http://www.ubuntu.com/usn/usn-355-1
Cert/CC Advisory: TA07-072A
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
CERT/CC vulnerability note: VU#787448
http://www.kb.cert.org/vuls/id/787448
BugTraq ID: 20216
http://www.securityfocus.com/bid/20216
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10462
http://secunia.com/advisories/34274
http://www.vupen.com/english/advisories/2006/3777
http://www.vupen.com/english/advisories/2006/4401
http://www.vupen.com/english/advisories/2006/4869
http://www.vupen.com/english/advisories/2007/0930
http://www.vupen.com/english/advisories/2007/1332
http://www.vupen.com/english/advisories/2007/2119
http://www.osvdb.org/29152
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1193
http://securitytracker.com/id?1016931
http://secunia.com/advisories/22091
http://secunia.com/advisories/21923
http://secunia.com/advisories/22164
http://secunia.com/advisories/22158
http://secunia.com/advisories/22183
http://secunia.com/advisories/22196
http://secunia.com/advisories/22236
http://secunia.com/advisories/22270
http://secunia.com/advisories/22116
http://secunia.com/advisories/22208
http://secunia.com/advisories/22245
http://secunia.com/advisories/22352
http://secunia.com/advisories/22362
http://secunia.com/advisories/22495
http://secunia.com/advisories/22487
http://secunia.com/advisories/22823
http://secunia.com/advisories/22926
http://secunia.com/advisories/23038
http://secunia.com/advisories/23241
http://secunia.com/advisories/22298
http://secunia.com/advisories/23340
http://secunia.com/advisories/23680
http://secunia.com/advisories/24479
http://secunia.com/advisories/24805
http://secunia.com/advisories/25608
http://secunia.com/advisories/24799
http://secunia.com/advisories/29371
http://www.vupen.com/english/advisories/2009/0740
XForce ISS Database: openssh-block-dos(29158)
http://xforce.iss.net/xforce/xfdb/29158
Common Vulnerability Exposure (CVE) ID: CVE-2006-5051
http://lists.freebsd.org/pipermail/freebsd-security/2006-October/004051.html
CERT/CC vulnerability note: VU#851340
http://www.kb.cert.org/vuls/id/851340
BugTraq ID: 20241
http://www.securityfocus.com/bid/20241
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11387
http://www.vupen.com/english/advisories/2006/4018
http://www.vupen.com/english/advisories/2006/4329
http://www.osvdb.org/29264
http://securitytracker.com/id?1016940
http://secunia.com/advisories/22173
XForce ISS Database: openssh-signal-handler-race-condition(29254)
http://xforce.iss.net/xforce/xfdb/29254
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

This is only one of 39644 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.