Lucene search

K
centosCentOS ProjectCESA-2006:0298
HistoryJul 20, 2006 - 3:13 p.m.

openssh security update

2006-07-2015:13:49
CentOS Project
lists.centos.org
46

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.02 Low

EPSS

Percentile

88.7%

CentOS Errata and Security Advisory CESA-2006:0298

OpenSSH is OpenBSD’s SSH (Secure SHell) protocol implementation. This
package includes the core files necessary for both the OpenSSH client and
server.

An arbitrary command execution flaw was discovered in the way scp copies
files locally. It is possible for a local attacker to create a file with a
carefully crafted name that could execute arbitrary commands as the user
running scp to copy files locally. (CVE-2006-0225)

The SSH daemon, when restricting host access by numeric IP addresses and
with VerifyReverseMapping disabled, allows remote attackers to bypass
β€œfrom=” and β€œuser@host” address restrictions by connecting to a host from a
system whose reverse DNS hostname contains the numeric IP address.
(CVE-2003-0386)

The following issues have also been fixed in this update:

  • If the sshd service was stopped using the sshd init script while the
    main sshd daemon was not running, the init script would kill other sshd
    processes, such as the running sessions. For example, this could happen
    when the β€˜service sshd stop’ command was issued twice.

  • When privilege separation was enabled, the last login message was printed
    only for the root user.

  • The sshd daemon was sending messages to the system log from a signal
    handler when debug logging was enabled. This could cause a deadlock of
    the user’s connection.

All users of openssh should upgrade to these updated packages, which
resolve these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2006-August/075255.html
https://lists.centos.org/pipermail/centos-announce/2006-August/075256.html
https://lists.centos.org/pipermail/centos-announce/2006-July/075212.html
https://lists.centos.org/pipermail/centos-announce/2006-July/075214.html

Affected packages:
openssh
openssh-askpass
openssh-askpass-gnome
openssh-clients
openssh-server

Upstream details at:
https://access.redhat.com/errata/RHSA-2006:0298

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.02 Low

EPSS

Percentile

88.7%