Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.59507
Category:Fedora Local Security Checks
Title:Fedora Core 6 FEDORA-2007-394 (openssh)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to openssh
announced via advisory FEDORA-2007-394.

SSH (Secure SHell) is a program for logging into and executing
commands on a remote machine. SSH is intended to replace rlogin and
rsh, and to provide secure encrypted communications between two
untrusted hosts over an insecure network. X11 connections and
arbitrary TCP/IP ports can also be forwarded over the secure channel.

OpenSSH is OpenBSD's version of the last free version of SSH, bringing
it up to date in terms of security and features, as well as removing
all patented algorithms to separate libraries.

This package includes the core files necessary for both the OpenSSH
client and server. To make this package useful, you should also
install openssh-clients, openssh-server, or both.


* Fri Mar 30 2007 Miloslav Trmac - 4.3p2-19
- Fix an information leak in Kerberos password authentication (CVE-2006-5052)
Resolves: #234640

Solution: Apply the appropriate updates.

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/


This update can be installed with the 'yum' update program. Use 'yum update
package-name' at the command line. For more information, refer to 'Managing
Software with yum,' available at http://fedora.redhat.com/docs/yum/.


http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2007-394

Risk factor : Medium

CVSS Score:
5.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-5052
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
BugTraq ID: 20245
http://www.securityfocus.com/bid/20245
Bugtraq: 20061005 rPSA-2006-0185-1 gnome-ssh-askpass openssh openssh-client openssh-server (Google Search)
http://www.securityfocus.com/archive/1/447861/100/200/threaded
Cert/CC Advisory: TA07-072A
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
http://security.gentoo.org/glsa/glsa-200611-06.xml
http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2
http://www.osvdb.org/29266
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10178
RedHat Security Advisories: RHSA-2006:0697
http://rhn.redhat.com/errata/RHSA-2006-0697.html
http://www.redhat.com/support/errata/RHSA-2007-0540.html
http://www.redhat.com/support/errata/RHSA-2007-0703.html
http://securitytracker.com/id?1016939
http://secunia.com/advisories/22158
http://secunia.com/advisories/22173
http://secunia.com/advisories/22495
http://secunia.com/advisories/22823
http://secunia.com/advisories/24479
http://secunia.com/advisories/27588
http://secunia.com/advisories/28320
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.592566
SuSE Security Announcement: SUSE-SA:2006:062 (Google Search)
http://www.novell.com/linux/security/advisories/2006_62_openssh.html
http://www.vupen.com/english/advisories/2007/0930
XForce ISS Database: openssh-gssapi-user-enumeration(29255)
https://exchange.xforce.ibmcloud.com/vulnerabilities/29255
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.