December 20th, 2002, 10:28 AM
Multiple Vulnerabilities in SSH Implementations
The impact will vary for different vulnerabilities and products, but in severe cases, remote attackers could execute arbitrary code with the privileges of the SSH process. Both SSH clients and servers are affected, since both implement the SSH transport layer protocol. On Microsoft Windows systems, SSH servers commonly run with SYSTEM privileges, and on UNIX systems, SSH daemons typically run with root privileges. In the case of SSH clients, any attacker-supplied code would run with at least the privileges of the user who started the client program. Additional privileges may be afforded to an attacker when the SSH client is setuid or setgid to a more privileged user, such as root. Attackers could also crash a vulnerable SSH process, causing a denial of service.
Note: this doesn't apply for most newer linux distro's, as they come with openSSH wich doesn't seem to be affected by this.
This all came to light by the rapid7 advisory..
ASCII stupid question, get a stupid ANSI.
When in Russia, pet a PETSCII.
Get your ass over to SLAYRadio
the best station for C64 Remixes !
December 20th, 2002, 03:26 PM
Thanxs, for tha alert!
Cert.org always on top of things