Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.59014
Category:Slackware Local Security Checks
Title:Slackware: Security Advisory (SSA:2007-255-01)
Summary:The remote host is missing an update for the 'openssh' package(s) announced via the SSA:2007-255-01 advisory.
Description:Summary:
The remote host is missing an update for the 'openssh' package(s) announced via the SSA:2007-255-01 advisory.

Vulnerability Insight:
New openssh packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1,
10.2, 11.0, and 12.0 to fix a possible security issue. This version should
also provide increased performance with certain ciphers.

More details about this issue may be found in the Common
Vulnerabilities and Exposures (CVE) database:

[link moved to references]


Here are the details from the Slackware 12.0 ChangeLog:
+--------------------------+
patches/packages/openssh-4.7p1-i486-1_slack12.0.tgz:
Upgraded to openssh-4.7p1.
From the OpenSSH release notes:
'Security bugs resolved in this release: Prevent ssh(1) from using a
trusted X11 cookie if creation of an untrusted cookie fails, found and
fixed by Jan Pechanec.'
While it's fair to say that we here at Slackware don't see how this could
be leveraged to compromise a system, a) the OpenSSH people (who presumably
understand the code better) characterize this as a security bug, b) it has
been assigned a CVE entry, and c) OpenSSH is one of the most commonly used
network daemons. Better safe than sorry.
More information should appear here eventually:
[link moved to references]
(* Security fix *)
+--------------------------+

Affected Software/OS:
'openssh' package(s) on Slackware 8.1, Slackware 9.0, Slackware 9.1, Slackware 10.0, Slackware 10.1, Slackware 10.2, Slackware 11.0, Slackware 12.0.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-4752
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
BugTraq ID: 25628
http://www.securityfocus.com/bid/25628
Bugtraq: 20070917 FLEA-2007-0055-1 openssh openssh-client openssh-server gnome-ssh-askpass (Google Search)
http://www.securityfocus.com/archive/1/479760/100/0/threaded
Bugtraq: 20071115 Re: HPSBUX02287 SSRT071485 rev.1 - HP-UX Running HP Secure Shell, Remotely Gain Extended Privileges (Google Search)
http://www.securityfocus.com/archive/1/483748/100/200/threaded
Debian Security Information: DSA-1576 (Google Search)
http://www.debian.org/security/2008/dsa-1576
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00214.html
http://security.gentoo.org/glsa/glsa-200711-02.xml
HPdes Security Advisory: HPSBUX02287
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085
HPdes Security Advisory: SSRT071485
http://www.mandriva.com/security/advisories?name=MDKSA-2007:236
https://bugzilla.redhat.com/show_bug.cgi?id=280471
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10809
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5599
http://www.redhat.com/support/errata/RHSA-2008-0855.html
http://secunia.com/advisories/27399
http://secunia.com/advisories/29420
http://secunia.com/advisories/30249
http://secunia.com/advisories/31575
http://secunia.com/advisories/32241
http://securityreason.com/securityalert/3126
SuSE Security Announcement: SUSE-SR:2007:022 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html
http://www.ubuntu.com/usn/usn-566-1
http://www.vupen.com/english/advisories/2007/3156
http://www.vupen.com/english/advisories/2008/0924/references
http://www.vupen.com/english/advisories/2008/2821
XForce ISS Database: openssh-x11cookie-privilege-escalation(36637)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36637
CopyrightCopyright (C) 2012 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.