Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2001:081: openssh


Vulnerability Assessment Details

MDKSA-2001:081: openssh

Vulnerability Assessment Summary
Check for the version of the openssh package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2001:081 (openssh).


In some circumstances, the sshd server may not honor the 'from=' option that can
be associated with a key in a user's ~/.ssh/authorized_keys2 file if multiple
keys are listed. This could permit key-based logins from hosts which should not
be permited access.


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2001:081
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

New 4GB DDR3L 1600Mhz PC3L-12800S SO-Dimm 204pin 1.35V CL11 SDRAM Laptop Memory
$23.99
New 4GB DDR3L 1600Mhz PC3L-12800S SO-Dimm 204pin 1.35V CL11 SDRAM Laptop Memory picturePanasonic Toughbook CF-18 Memory/spk Cover ASSEMBLY BRAND NEW
$69.95
Panasonic Toughbook CF-18 Memory/spk Cover  ASSEMBLY  BRAND NEW  pictureAcer Aspire V3-574 15.6-inch Laptop | i7-5500U | 8GB memory | 1TB HDD | Windows
$730.11
Acer Aspire V3-574 15.6-inch Laptop | i7-5500U | 8GB memory | 1TB HDD | Windows pictureVintage Early Computer CPU/Memory Gold Pin Ceramic Chip IC Integrated Circuit
$49.0
Vintage Early Computer CPU/Memory Gold Pin Ceramic Chip IC Integrated Circuit picture


Discussions

No Discussions have been posted on this vulnerability.