Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA134] DSA-134-4 ssh

Vulnerability Assessment Details

[DSA134] DSA-134-4 ssh

Vulnerability Assessment Summary
DSA-134-4 ssh

Detailed Explanation for this Vulnerability Assessment

ISS X-Force released an advisory about an OpenSSH "Remote Challenge
Vulnerability". Unfortunately, the advisory was incorrect on some
points, leading to widespread confusion about the impact of this
vulnerability. No version of OpenSSH in Debian is affected by the
SKEY and BSD_AUTH authentication methods described in the ISS
advisory. However, Debian does include OpenSSH servers with the PAM
feature described as vulnerable in the later advisory by the OpenSSH
team. (This vulnerable feature is authentication using PAM via the
keyboard-interactive mechanism [kbdint].) This vulnerability affects
OpenSSH versions 2.3.1 through 3.3. No exploit is currently known for
the PAM/kbdint vulnerability, but the details are publicly known. All
of these vulnerabilities were corrected in OpenSSH 3.4.
In addition to the vulnerabilities fixes outlined above, our OpenSSH
packages version 3.3 and higher support the new privilege separation
feature from Niels Provos, which changes ssh to use a separate
non-privileged process to handle most of the work. Vulnerabilities in
the unprivileged parts of OpenSSH will lead to compromise of an
unprivileged account restricted to an empty chroot, rather than a
direct root compromise. Privilege separation should help to mitigate
the risks of any future OpenSSH compromise.
Debian 2.2 (potato) shipped with an ssh package based on OpenSSH
1.2.3, and is not vulnerable to the vulnerabilities covered by this
advisory. Users still running a version 1.2.3 ssh package do not have
an immediate need to upgrade to OpenSSH 3.4. Users who upgraded to the
OpenSSH version 3.3 packages released in previous iterations of
DSA-134 should upgrade to the new version 3.4 OpenSSH packages, as the
version 3.3 packages are vulnerable. We suggest that users running
OpenSSH 1.2.3 consider a move to OpenSSH 3.4 to take advantage of the
privilege separation feature. (Though, again, we have no specific
knowledge of any vulnerability in OpenSSH 1.2.3. Please carefully read
the caveats listed below before upgrading from OpenSSH 1.2.3.) We
recommend that any users running a back-ported version of OpenSSH
version 2.0 or higher on potato move to OpenSSH 3.4.
The current pre-release version of Debian (woody) includes an OpenSSH
version 3.0.2p1 package (ssh), which is vulnerable to the PAM/kbdint
problem described above. We recommend that users upgrade to OpenSSH
3.4 and enable privilege separation. Please carefully read the release
notes below before upgrading. Updated packages for ssh-krb5 (an
OpenSSH package supporting kerberos authentication) are currently
being developed. Users who cannot currently upgrade their OpenSSH
packages may work around the known vulnerabilities by disabling the
vulnerable features: make sure the following lines are uncommented and
present in /etc/ssh/sshd_config and restart ssh

PAMAuthenticationViaKbdInt no
ChallengeResponseAuthentication no

There should be no other PAMAuthenticationViaKbdInt or
ChallengeResponseAuthentication entries in sshd_config.
That concludes the vulnerability section of this advisory. What
follows are r

Solution :
Network Security Threat Level: High

Networks Security ID: 5093

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Ninjaink® Compatible Toner Cartridge For Samsung ML-1500 ML-1510 ML-1520 ML-1710
Ninjaink® Compatible Toner Cartridge For Samsung ML-1500 ML-1510 ML-1520 ML-1710 picturePAIR Patriot 8 GB (2 x 4GB) 1600MHz DDR3 SODIMM PC3-12800 (PSD38G1600SK) Memory
PAIR Patriot 8 GB (2 x 4GB) 1600MHz DDR3 SODIMM PC3-12800 (PSD38G1600SK) Memory pictureLenovo Yoga Samsung MZ-NLN1280 128GB M.2 SATA Solid State Drive SSD
Lenovo Yoga Samsung MZ-NLN1280 128GB M.2 SATA Solid State Drive SSD pictureSamsung Metallic Black 11.6" XE500C13-K01US Chromebook 3 PC with Intel Celeron N
Samsung Metallic Black 11.6


No Discussions have been posted on this vulnerability.