27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to OpenSSH 2.3.2 or higher.<br />

CVE-2001-1585<br />

OpenSSH < 3.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1986 FAMILY: SSH RISK: HIGH NESSUS ID:10802<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running a version of OpenSSH that is older than<br />

3.0.1. Versions older than 3.0.1 are vulnerable to a flaw in which an attacker may<br />

authenticate, provided that Kerberos V support has been enabled (which is not the case by<br />

default). It is also vulnerable to an excessive memory clearing bug, believed to be<br />

unexploitable. *** You may ignore this warning if this host is not using Kerberos V<br />

Solution: Upgrade to OpenSSH 3.0.1 or higher.<br />

CVE-2002-0083<br />

OpenSSH < 3.4 Multiple Remote Overflows<br />

<strong>PVS</strong> ID: 1987 FAMILY: SSH RISK: HIGH NESSUS ID:11031<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of OpenSSH which is older than 3.4. There is a flaw in this version that<br />

can be exploited remotely to give an attacker a shell on this host. Note that several<br />

distributions patched this hole without changing the version number of OpenSSH. Note:<br />

<strong>PVS</strong> solely relied on the banner of the remote SSH server to perform this check. If you are<br />

running a RedHat host, make sure that the command :\nrpm -q openssh-server\n Returns :<br />

openssh-server-3.1p1-6.<br />

Solution: Upgrade to OpenSSH 3.4 or contact your vendor for a patch.<br />

CVE-2002-0640<br />

OpenSSH < 2.9.9 Multiple Key Type ACL Bypass<br />

<strong>PVS</strong> ID: 1988 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10771<br />

Description: Synopsis :\n\nRemote users may be able to circumvent system policy.\n\nThe remote host<br />

is running a version of OpenSSH between 2.5.x and 2.9.x. Depending on the order of the<br />

user keys in ~/.ssh/authorized_keys2, sshd might fail to apply the source IP based access<br />

control restriction to the correct key. This problem allows users to circumvent the system<br />

policy and login from disallowed source IP address.<br />

Solution: Upgrade to OpenSSH 2.9.9 or higher.<br />

CVE-2001-1380<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

OpenSSH < 3.2.1 AFS/Kerberos Ticket/Token Passing Overflow<br />

Family Internet Services 507

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!