SSH Communications' Secure Shell contains vulnerabilities in ASN.1 libraries that may allow remote attackers to cause a denial-of-service situation, or potentially execute arbitrary code on the server.
SSH Communications' Secure Shell contains a vulnerability in the decoding of BER/DER encoded packets. According to the SSH Communications Advisory:
BER/DER encoding is applied in digital certificates, which are used for authenticating a user to a host. Certificates are also commonly used for authenticating SSL/TLS connections.
Note that this vulnerability does not affect the non-commercial versions of SSH Secure Shell (Unix), as these versions do not contain the vulnerable ASN.1 related libraries.
This vulnerability may be related to the "Multiple vulnerabilities in SSL/TLS implementations" described in VU#104280.
A remote unauthenticated attaker may be able to crash the target server, causing a denial of service. Exploitation may also permit the execution of arbitrary code.
SSH Communications has released version 3.2.9 of SSH Secure Shell to resolve this issue. Please see the SSH Communications' Advisory for more details on upgrading. Likewise, vendors that redistribute versions of this product may provide their own patches or updates.
According to the SSH Communications' Advisory:
Your server is not vulnerable if:
Vendor| Status| Date Notified| Date Updated
F-Secure| | -| 07 Oct 2003
SSH Communications Security| | -| 03 Oct 2003
Stonesoft| | -| 03 Oct 2003
AppGate Network Security AB| | -| 03 Oct 2003
Bitvise| | -| 03 Oct 2003
MacSSH| | -| 07 Oct 2003
Riverstone Networks| | -| 03 Oct 2003
If you are a vendor and your product is affected, let us know.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A
Thanks to Stonesoft for reporting this vulnerability.
This document was written by Jason A Rafail.