Hi, I'm running SuSE 8.0, with OpenSSH 3.0.2p1-108. This morning, I did a Nessus scan on one of my boxen at home, which reported that this version is vulnerable to the off-by-one hole. I checked the Security Announcement about this (SuSE-SA:2002:009), but this predates 8.0, and refers to fixed versions of 2.9.9. Is the package of 3.0.2p2 in 8.0 patched to fix this hole as well, thus rendering that aspect of my Nessus report a red herring? If not, is there an update in the works? Cheers James -- James Ogley, Unix Systems Administrator, Pinnacle Insurance Plc james.ogley@pinnacle.co.uk www.pinnacle.co.uk +44 (0) 20 8731 3619 Using Free Software since 1994, running GNU/Linux (SuSE 8.0) Updated GNOME RPMs for SuSE Linux: www.usr-local-bin.org ********************************************************************** CONFIDENTIALITY.This e-mail and any attachments are confidential and may also be privileged. If you are not the named recipient, please notify the sender immediately and do not disclose the contents to another person, use it for any purpose, or store or copy the information in any medium. Any views expressed in this message are those of the individual sender, except where the sender specifically states them to be the views of Pinnacle Insurance plc. If you have received this email in error please immediately notify the Pinnacle Helpdesk on +44 (0) 20 8207 9555. This footnote also confirms that this email message has been swept by MIMEsweeper for the presence of computer viruses. www.mimesweeper.com **********************************************************************
James Ogley wrote:
I'm running SuSE 8.0, with OpenSSH 3.0.2p1-108.
This morning, I did a Nessus scan on one of my boxen at home, which reported that this version is vulnerable to the off-by-one hole.
I checked the Security Announcement about this (SuSE-SA:2002:009), but this predates 8.0, and refers to fixed versions of 2.9.9.
Is the package of 3.0.2p2 in 8.0 patched to fix this hole as well, thus
I have the same version - it looks like quite a few off-by-one patches went in: grep -n off.by.one /usr/share/doc/packages/openssh/ChangeLog 4272: off-by-one when removing a key from the agent 4620: - (djm) Another off-by-one fix from Pavel Kankovsky 4630: - (djm) Security: fix off-by-one buffer overrun in fake-getnameinfo.c. 6882: - Fixed off-by-one error in PAM env patch Kevin -- _ | Kevin Ivory | Tel: +49-551-37000041 |_ |\ | | Service Network GmbH | Fax: +49-551-3700009 ._|ER | \|ET | Bahnhofsallee 1b | mailto:Ivory@SerNet.de Service Network | 37081 Goettingen | http://www.SerNet.de/
SuSE patches the existing version with a release as not to break deps within the system. So if 8.0 comes with 3.0.2p1 then it has been patched and if another exploit comes up..then that same version number will be patched. * Kevin Ivory (Ivory@SerNet.de) [020620 03:26]: ::James Ogley wrote: ::> I'm running SuSE 8.0, with OpenSSH 3.0.2p1-108. ::> ::> This morning, I did a Nessus scan on one of my boxen at home, which ::> reported that this version is vulnerable to the off-by-one hole. ::> ::> I checked the Security Announcement about this (SuSE-SA:2002:009), but ::> this predates 8.0, and refers to fixed versions of 2.9.9. ::> ::> Is the package of 3.0.2p2 in 8.0 patched to fix this hole as well, thus :: ::I have the same version - it looks like quite a few off-by-one ::patches went in: :: ::grep -n off.by.one /usr/share/doc/packages/openssh/ChangeLog ::4272: off-by-one when removing a key from the agent ::4620: - (djm) Another off-by-one fix from Pavel Kankovsky ::4630: - (djm) Security: fix off-by-one buffer overrun in fake-getnameinfo.c. ::6882: - Fixed off-by-one error in PAM env patch -=Ben --=====-----=====-- mailto:ben@whack.org --=====-- Tell me what you believe..I tell you what you should see. -DP --=====-----=====--
participants (3)
-
Ben Rosenberg
-
James Ogley
-
Kevin Ivory