Rapid7 Vulnerability & Exploit Database

CESA-2006:0738: openssh security update

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

CESA-2006:0738: openssh security update



Updated openssh packages that fix an authentication flaw are now available for CentOS Linux 3 and 4. This update has been rated as having low security impact by the CentOS Security Response Team.

OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. This package includes the core files necessary for both the OpenSSH client and server. An authentication flaw was found in OpenSSH's privilege separation monitor. If it ever becomes possible to alter the behavior of the unprivileged process when OpenSSH is using privilege separation, an attacker may then be able to login without possessing proper credentials. (CVE-2006-5794) Please note that this flaw by itself poses no direct threat to OpenSSH users. Without another security flaw that could allow an attacker to alter the behavior of OpenSSH's unprivileged process, this flaw cannot be exploited. There are currently no known flaws to exploit this behavior. However, we have decided to issue this erratum to fix this flaw to reduce the security impact if an unprivileged process flaw is ever found. Users of openssh should upgrade to these updated packages, which contain a backported patch to resolve this issue.


  • centos-upgrade-openssh
  • centos-upgrade-openssh-askpass
  • centos-upgrade-openssh-askpass-gnome
  • centos-upgrade-openssh-clients
  • centos-upgrade-openssh-server

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center