|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2005-527: openssh Vulnerability Assessment Details
|
RHSA-2005-527: openssh |
||
Check for the version of the openssh packages Detailed Explanation for this Vulnerability Assessment Updated openssh packages that fix a security issue, bugs, and add support for recording login user IDs for audit are now available for Red Hat Enterprise Linux 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. An error in the way OpenSSH handled GSSAPI credential delegation was discovered. OpenSSH as distributed with Red Hat Enterprise Linux 4 contains support for GSSAPI user authentication, typically used for supporting Kerberos. On OpenSSH installations which have GSSAPI enabled, this flaw could permit a user who sucessfully authenticates using a method other than GSSAPI to be delegated with GSSAPI credentials. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-2798 to this issue. Additionally, the following bugs have been addressed: The ssh command incorrectly failed when it was issued by the root user with a non-default group set. The sshd daemon could fail to properly close the client connection if multiple X clients were forwarded over the connection and the client session exited. The sshd daemon could bind only on the IPv6 address family for X forwarding if the port on IPv4 address family was already bound. The X forwarding did not work in such cases. This update also adds support for recording login user IDs for the auditing service. The user ID is attached to the audit records generated from the user's session. All users of openssh should upgrade to these updated packages, which contain backported patches to resolve these issues. Solution : http://rhn.redhat.com/errata/RHSA-2005-527.html Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security |
||
Cables, Connectors |
HP ProLiant BL460c G9 (Gen9) 2x E5-2670V3 12 Core 3.1GHz No Ram or No Drives
$59.98
DELL PEM640 POWEREDGE M640 BLADE SERVER
$539.95
Dell PowerEdge FX2s CTO Blade 4 Slot 2U Chassis 2x 2000W
$399.00
DELL PowerEdge M630 Blade 2x E5-2683v3 2.0GHz =28 Cores 128GB H330 2x10Gb X520
$290.00
HP Proliant BL460C Gen8 Blade Server 2x 8C E5-2690 192GB Ram
$58.43
727021-B21 HP ProLiant BL460c G9(Gen9) E5 10Gb FlexibleLOM CTO Blade Server
$66.00
Dell PowerEdge M640 Barebone Server Blade No Hard Drive Trays
$499.00
Dell PowerEdge FC630 Server Blade Node 2*E5-2697 v4 2.30GHz CPU 256GB RAM NO HDD
$359.99
HP ProLiant BL460c G9(Gen9) 2x 10 CORE E5-2660v3 2.6GHz 128GB RAM No SSD
$222.00
HP ProLiant BL460c Gen9 Blade 2x E5-2697v3 2.6GHz =28 Cores 128GB P246 650FLB
$300.00
|
||
No Discussions have been posted on this vulnerability. |