Koozali.org: home of the SME Server
Legacy Forums => General Discussion (Legacy) => Topic started by: Alex Crouzen on March 08, 2002, 12:06:08 PM
-
While strolling through Slashdot today, I saw a warning for a possible exploit (local now, but possibly remote too) in OpenSSH, versions 2.0 up to 3.0.2.
Is this worth another security update, or is OpenSSH easily upgraded with an RPM? A 'simple' patch is given, but that means rebuilding the source, which on a stock server isn't possible.
Alex.
-
The problem code is only encountered after channels are established, and
channels are never established prior to authentication, so the bug can
only be exploited by authenticated users. Even then, it's an overflow
on the heap, not the stack, so it would be difficult to exploit at all,
and extremely difficult to exploit with an outcome other than "user's
ssh session terminates".
Your best strategy on this bug for now is to ensure that the users that
have access to your server are trustworthy, or disable SSH.
Cheers,
--Rich