Bugtraq mailing list archives
[SECURITY] [DSA 119-1] ssh channel bug
From: Michael Stone <mstone () pandora debian org>
Date: Fri, 08 Mar 2002 21:35:16 +0100
-----BEGIN PGP SIGNED MESSAGE----- - ---------------------------------------------------------------------------- Debian Security Advisory security () debian org http://www.debian.org/security/ Michael Stone March 7, 2002 - ---------------------------------------------------------------------------- Package: openssh Vulnerability: local root exploit, remote client exploit Debian-specific: no Joost Pol <joost () pine nl> reports that OpenSSH versions 2.0 through 3.0.2 have an off-by-one bug in the channel allocation code. This vulnerability can be exploited by authenticated users to gain root privilege or by a malicious server exploiting a client with this bug. Since Debian 2.2 (potato) shipped with OpenSSH (the "ssh" package) version 1.2.3, it is not vulnerable to this exploit. No fix is required for Debian 2.2 (potato). The Debian unstable and testing archives do include a more recent OpenSSH (ssh) package. If you are running these pre-release distributions you should ensure that you are running version 3.0.2p1-8, a patched version which was added to the unstable archive today, or a later version. - ---------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce () lists debian org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iQCVAwUBPIkgYw0hVr09l8FJAQE3bwQApAYLyouyfSxma4sxnqk74xb/jVd324/U demNb7wTp6fVkLUYKC6d0HTFYtFhlnTh9qHpmQRG0nUE9FgdoB0NVgBjpBEXAxU8 8wkX84dfAYLCZBBF6R01XozJFb+rWVoSAGUunMgtnEWXnAa8ZNkwstVX4X38HoVf BHkicmvH6Fg= =vFPj -----END PGP SIGNATURE-----
Current thread:
- [SECURITY] [DSA 119-1] ssh channel bug Michael Stone (Mar 08)