![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.59014 |
Category: | Slackware Local Security Checks |
Title: | Slackware: Security Advisory (SSA:2007-255-01) |
Summary: | The remote host is missing an update for the 'openssh' package(s) announced via the SSA:2007-255-01 advisory. |
Description: | Summary: The remote host is missing an update for the 'openssh' package(s) announced via the SSA:2007-255-01 advisory. Vulnerability Insight: New openssh packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, and 12.0 to fix a possible security issue. This version should also provide increased performance with certain ciphers. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database: [link moved to references] Here are the details from the Slackware 12.0 ChangeLog: +--------------------------+ patches/packages/openssh-4.7p1-i486-1_slack12.0.tgz: Upgraded to openssh-4.7p1. From the OpenSSH release notes: 'Security bugs resolved in this release: Prevent ssh(1) from using a trusted X11 cookie if creation of an untrusted cookie fails, found and fixed by Jan Pechanec.' While it's fair to say that we here at Slackware don't see how this could be leveraged to compromise a system, a) the OpenSSH people (who presumably understand the code better) characterize this as a security bug, b) it has been assigned a CVE entry, and c) OpenSSH is one of the most commonly used network daemons. Better safe than sorry. More information should appear here eventually: [link moved to references] (* Security fix *) +--------------------------+ Affected Software/OS: 'openssh' package(s) on Slackware 8.1, Slackware 9.0, Slackware 9.1, Slackware 10.0, Slackware 10.1, Slackware 10.2, Slackware 11.0, Slackware 12.0. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2007-4752 http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html BugTraq ID: 25628 http://www.securityfocus.com/bid/25628 Bugtraq: 20070917 FLEA-2007-0055-1 openssh openssh-client openssh-server gnome-ssh-askpass (Google Search) http://www.securityfocus.com/archive/1/479760/100/0/threaded Bugtraq: 20071115 Re: HPSBUX02287 SSRT071485 rev.1 - HP-UX Running HP Secure Shell, Remotely Gain Extended Privileges (Google Search) http://www.securityfocus.com/archive/1/483748/100/200/threaded Debian Security Information: DSA-1576 (Google Search) http://www.debian.org/security/2008/dsa-1576 https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00214.html http://security.gentoo.org/glsa/glsa-200711-02.xml HPdes Security Advisory: HPSBUX02287 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01271085 HPdes Security Advisory: SSRT071485 http://www.mandriva.com/security/advisories?name=MDKSA-2007:236 https://bugzilla.redhat.com/show_bug.cgi?id=280471 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10809 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5599 http://www.redhat.com/support/errata/RHSA-2008-0855.html http://secunia.com/advisories/27399 http://secunia.com/advisories/29420 http://secunia.com/advisories/30249 http://secunia.com/advisories/31575 http://secunia.com/advisories/32241 http://securityreason.com/securityalert/3126 SuSE Security Announcement: SUSE-SR:2007:022 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html http://www.ubuntu.com/usn/usn-566-1 http://www.vupen.com/english/advisories/2007/3156 http://www.vupen.com/english/advisories/2008/0924/references http://www.vupen.com/english/advisories/2008/2821 XForce ISS Database: openssh-x11cookie-privilege-escalation(36637) https://exchange.xforce.ibmcloud.com/vulnerabilities/36637 |
Copyright | Copyright (C) 2012 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |