Rapid7 Vulnerability & Exploit Database

RHSA-2002:127: Updated OpenSSH packages fix various security issues

Back to Search

RHSA-2002:127: Updated OpenSSH packages fix various security issues

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
07/03/2002
Created
07/25/2018
Added
10/28/2005
Modified
07/04/2017

Description

Updated openssh packages are now available for Red Hat Linux 7, 7.1, 7.2, and 7.3. These updates fix an input validation error in OpenSSH. [Updated 16 April 2003] Added packages for Red Hat Linux on IBM iSeries and pSeries systems.

OpenSSH provides an implementation of the SSH (secure shell) protocol used for logging into and executing commands on remote machines. Versions of the OpenSSH server between 2.3.1 and 3.3 contain an input validation error that can result in an integer overflow and privilege escalation. At this time, Red Hat does not believe that the default installation of OpenSSH on Red Hat Linux is vulnerable to this issue; however a user would be vulnerable if the configuration option "PAMAuthenticationViaKbdInt" is enabled in the sshd configuration file. Please note that this option is not enabled by default. We have applied the security fix provided by the OpenSSH team to these errata packages which are based on OpenSSH 3.1p1. This should minimize the impact of upgrading to our errata packages. All users of OpenSSH should update to these errata packages which are not vulnerable to this issue. [Update 6/28/2002] Added packages for Red Hat Linux 7.2 for s390.

Solution(s)

  • redhat-upgrade-openssh
  • redhat-upgrade-openssh-askpass
  • redhat-upgrade-openssh-askpass-gnome
  • redhat-upgrade-openssh-clients
  • redhat-upgrade-openssh-server

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;