Lucene search

K
redhatRedHatRHSA-2007:0257
HistoryMay 01, 2007 - 12:00 a.m.

(RHSA-2007:0257) Low: openssh security and bug fix update

2007-05-0100:00:00
access.redhat.com
12

1.2 Low

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:H/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

29.8%

OpenSSH is OpenBSD’s SSH (Secure SHell) protocol implementation. This
package includes the core files necessary for both the OpenSSH client and
server.

OpenSSH stores hostnames, IP addresses, and keys in plaintext in the
known_hosts file. A local attacker that has already compromised a user’s
SSH account could use this information to generate a list of additional
targets that are likely to have the same password or key. (CVE-2005-2666)

The following bugs have also been fixed in this update:

  • The ssh client could abort the running connection when the server
    application generated a large output at once.

  • When ‘X11UseLocalhost’ option was set to ‘no’ on systems with IPv6
    networking enabled, the X11 forwarding socket listened only for IPv6
    connections.

  • When the privilege separation was enabled in /etc/ssh/sshd_config, some
    log messages in the system log were duplicated and also had timestamps from
    an incorrect timezone.

All users of openssh should upgrade to these updated packages, which
contain backported patches to correct these issues.

1.2 Low

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:H/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

29.8%