Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.58971
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2007:0540
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory RHSA-2007:0540.

OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. These
packages include the core files necessary for both the OpenSSH client and
server.

A flaw was found in the way the ssh server wrote account names to the audit
subsystem. An attacker could inject strings containing parts of audit
messages, which could possibly mislead or confuse audit log parsing tools.
(CVE-2007-3102)

A flaw was found in the way the OpenSSH server processes GSSAPI
authentication requests. When GSSAPI authentication was enabled in the
OpenSSH server, a remote attacker was potentially able to determine if a
username is valid. (CVE-2006-5052)

The following bugs in SELinux MLS (Multi-Level Security) support has also
been fixed in this update:

* It was sometimes not possible to select a SELinux role and level when
logging in using ssh.

* If the user obtained a non-default SELinux role or level, the role change
was not recorded in the audit subsystem.

* In some cases, on labeled networks, sshd allowed logins from level ranges
it should not allow.

The updated packages also contain experimental support for using private
keys stored in PKCS#11 tokens for client authentication. The support is
provided through the NSS (Network Security Services) library.

All users of openssh should upgrade to these updated packages, which
contain patches to correct these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2007-0540.html
http://www.redhat.com/security/updates/classification/#moderate

Risk factor : Medium

CVSS Score:
5.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-5052
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
BugTraq ID: 20245
http://www.securityfocus.com/bid/20245
Bugtraq: 20061005 rPSA-2006-0185-1 gnome-ssh-askpass openssh openssh-client openssh-server (Google Search)
http://www.securityfocus.com/archive/1/447861/100/200/threaded
Cert/CC Advisory: TA07-072A
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
http://security.gentoo.org/glsa/glsa-200611-06.xml
http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2
http://www.osvdb.org/29266
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10178
RedHat Security Advisories: RHSA-2006:0697
http://rhn.redhat.com/errata/RHSA-2006-0697.html
http://www.redhat.com/support/errata/RHSA-2007-0540.html
http://www.redhat.com/support/errata/RHSA-2007-0703.html
http://securitytracker.com/id?1016939
http://secunia.com/advisories/22158
http://secunia.com/advisories/22173
http://secunia.com/advisories/22495
http://secunia.com/advisories/22823
http://secunia.com/advisories/24479
http://secunia.com/advisories/27588
http://secunia.com/advisories/28320
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566
SuSE Security Announcement: SUSE-SA:2006:062 (Google Search)
http://www.novell.com/linux/security/advisories/2006_62_openssh.html
http://www.vupen.com/english/advisories/2007/0930
XForce ISS Database: openssh-gssapi-user-enumeration(29255)
https://exchange.xforce.ibmcloud.com/vulnerabilities/29255
Common Vulnerability Exposure (CVE) ID: CVE-2007-3102
BugTraq ID: 26097
http://www.securityfocus.com/bid/26097
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00214.html
https://bugzilla.redhat.com/show_bug.cgi?id=248059
http://osvdb.org/39214
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11124
http://www.redhat.com/support/errata/RHSA-2007-0555.html
http://www.redhat.com/support/errata/RHSA-2007-0737.html
http://secunia.com/advisories/27235
http://secunia.com/advisories/27590
http://secunia.com/advisories/28319
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.