Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in openssh
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in openssh
ID: RHSA-2006:0044-01
Distribution: Red Hat
Plattformen: Red Hat Enterprise Linux
Datum: Di, 7. März 2006, 16:58
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0225
Applikationen: Portable OpenSSH

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Low: openssh security update
Advisory ID: RHSA-2006:0044-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0044.html
Issue date: 2006-03-07
Updated on: 2006-03-07
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-0225
- ---------------------------------------------------------------------

1. Summary:

Updated openssh packages that fix bugs in sshd and add auditing of user
logins are now available for Red Hat Enterprise Linux 4.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. This
package includes the core files necessary for both the OpenSSH client and
server.

An arbitrary command execution flaw was discovered in the way scp copies
files locally. It is possible for a local attacker to create a file with a
carefully crafted name that could execute arbitrary commands as the user
running scp to copy files locally. The Common Vulnerabilities and Exposures
project (cve.mitre.org) assigned the name CVE-2006-0225 to this issue.

The following issue has also been fixed in this update:

* If the sshd service was stopped using the sshd init script while the
main sshd daemon was not running, the init script would kill other sshd
processes, such as the running sessions. For example, this could happen
when the 'service sshd stop' command was issued twice.

Additionally, this update implements auditing of user logins through the
system audit service.

All users of openssh should upgrade to these updated packages, which
resolve these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

170466 - CVE-2006-0225 local to local copy uses shell expansion twice
170468 - init script kills all running sshd's if listening server is
stopped
170568 - add audit message to sshd


6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
openssh-3.9p1-8.RHEL4.12.src.rpm
2578e547e59c73fdca370de8e98c5503 openssh-3.9p1-8.RHEL4.12.src.rpm

i386:
21757cc7559d10b6c0d129ad09f7457b openssh-3.9p1-8.RHEL4.12.i386.rpm
d8f08434752602146534024a54d8597e openssh-askpass-3.9p1-8.RHEL4.12.i386.rpm
73f9af460966644a1996be486cbd2cfc
openssh-askpass-gnome-3.9p1-8.RHEL4.12.i386.rpm
d753e37401a9a8bc837232c8c04565fe openssh-clients-3.9p1-8.RHEL4.12.i386.rpm
ed7c9a6d9dcdb8104da21f65fb318c8f openssh-server-3.9p1-8.RHEL4.12.i386.rpm

ia64:
4e7aa26129bf1905d97faf99b8e116b4 openssh-3.9p1-8.RHEL4.12.ia64.rpm
9d66c16e57e3c21b3678dd12d1851f10 openssh-askpass-3.9p1-8.RHEL4.12.ia64.rpm
11ff74898dfe0ace6fc2f0ff5e89c24c
openssh-askpass-gnome-3.9p1-8.RHEL4.12.ia64.rpm
70fc3a2a4b8f641203673b1f62282c33 openssh-clients-3.9p1-8.RHEL4.12.ia64.rpm
de9c83fa4b93dea3f8d42b4df4fd569a openssh-server-3.9p1-8.RHEL4.12.ia64.rpm

ppc:
46b6e719c56a74aa46e191c2f36999e3 openssh-3.9p1-8.RHEL4.12.ppc.rpm
7cd82332e39423ba4698875b31e43623 openssh-askpass-3.9p1-8.RHEL4.12.ppc.rpm
387227b69d7a1be97fa3368c84907f41
openssh-askpass-gnome-3.9p1-8.RHEL4.12.ppc.rpm
8e3c9db269da8a446baa6e0f61faf43c openssh-clients-3.9p1-8.RHEL4.12.ppc.rpm
dd99de85e9e030b6624fb698e3775322 openssh-server-3.9p1-8.RHEL4.12.ppc.rpm

s390:
6f17b04da53dd4deba4c6a43983e94af openssh-3.9p1-8.RHEL4.12.s390.rpm
48ef2ac4db2a7d9596de43f9dc27cdff openssh-askpass-3.9p1-8.RHEL4.12.s390.rpm
9a2d946cecb4fd484c769ebd54541b2e
openssh-askpass-gnome-3.9p1-8.RHEL4.12.s390.rpm
f9f5373f55575664a575caf776ffde43 openssh-clients-3.9p1-8.RHEL4.12.s390.rpm
6a79297b27544cc7fc7d971d5979fccd openssh-server-3.9p1-8.RHEL4.12.s390.rpm

s390x:
ca31fdbf5a061487d602174f9fe23f48 openssh-3.9p1-8.RHEL4.12.s390x.rpm
cddba42d826ab7825058d1a07b0cee80 openssh-askpass-3.9p1-8.RHEL4.12.s390x.rpm
eff616e124743dc63d2d9f3789f4da18
openssh-askpass-gnome-3.9p1-8.RHEL4.12.s390x.rpm
579853e1cd8415e7f24c4c477ea919e6 openssh-clients-3.9p1-8.RHEL4.12.s390x.rpm
0cd9686cdfa1f751fc7c39783fbf29ae openssh-server-3.9p1-8.RHEL4.12.s390x.rpm

x86_64:
538abab594c138be17494e21eef0f8c0 openssh-3.9p1-8.RHEL4.12.x86_64.rpm
74fb1a3069203034430479b873e229e5 openssh-askpass-3.9p1-8.RHEL4.12.x86_64.rpm
9eaf5f509a4442aa921751a73bd29e94
openssh-askpass-gnome-3.9p1-8.RHEL4.12.x86_64.rpm
08f183cef545498fc81ee61fba9e5ef5 openssh-clients-3.9p1-8.RHEL4.12.x86_64.rpm
eda71f6f994a92a323058e9e8c2ba4f9 openssh-server-3.9p1-8.RHEL4.12.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
openssh-3.9p1-8.RHEL4.12.src.rpm
2578e547e59c73fdca370de8e98c5503 openssh-3.9p1-8.RHEL4.12.src.rpm

i386:
21757cc7559d10b6c0d129ad09f7457b openssh-3.9p1-8.RHEL4.12.i386.rpm
d8f08434752602146534024a54d8597e openssh-askpass-3.9p1-8.RHEL4.12.i386.rpm
73f9af460966644a1996be486cbd2cfc
openssh-askpass-gnome-3.9p1-8.RHEL4.12.i386.rpm
d753e37401a9a8bc837232c8c04565fe openssh-clients-3.9p1-8.RHEL4.12.i386.rpm
ed7c9a6d9dcdb8104da21f65fb318c8f openssh-server-3.9p1-8.RHEL4.12.i386.rpm

x86_64:
538abab594c138be17494e21eef0f8c0 openssh-3.9p1-8.RHEL4.12.x86_64.rpm
74fb1a3069203034430479b873e229e5 openssh-askpass-3.9p1-8.RHEL4.12.x86_64.rpm
9eaf5f509a4442aa921751a73bd29e94
openssh-askpass-gnome-3.9p1-8.RHEL4.12.x86_64.rpm
08f183cef545498fc81ee61fba9e5ef5 openssh-clients-3.9p1-8.RHEL4.12.x86_64.rpm
eda71f6f994a92a323058e9e8c2ba4f9 openssh-server-3.9p1-8.RHEL4.12.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
openssh-3.9p1-8.RHEL4.12.src.rpm
2578e547e59c73fdca370de8e98c5503 openssh-3.9p1-8.RHEL4.12.src.rpm

i386:
21757cc7559d10b6c0d129ad09f7457b openssh-3.9p1-8.RHEL4.12.i386.rpm
d8f08434752602146534024a54d8597e openssh-askpass-3.9p1-8.RHEL4.12.i386.rpm
73f9af460966644a1996be486cbd2cfc
openssh-askpass-gnome-3.9p1-8.RHEL4.12.i386.rpm
d753e37401a9a8bc837232c8c04565fe openssh-clients-3.9p1-8.RHEL4.12.i386.rpm
ed7c9a6d9dcdb8104da21f65fb318c8f openssh-server-3.9p1-8.RHEL4.12.i386.rpm

ia64:
4e7aa26129bf1905d97faf99b8e116b4 openssh-3.9p1-8.RHEL4.12.ia64.rpm
9d66c16e57e3c21b3678dd12d1851f10 openssh-askpass-3.9p1-8.RHEL4.12.ia64.rpm
11ff74898dfe0ace6fc2f0ff5e89c24c
openssh-askpass-gnome-3.9p1-8.RHEL4.12.ia64.rpm
70fc3a2a4b8f641203673b1f62282c33 openssh-clients-3.9p1-8.RHEL4.12.ia64.rpm
de9c83fa4b93dea3f8d42b4df4fd569a openssh-server-3.9p1-8.RHEL4.12.ia64.rpm

x86_64:
538abab594c138be17494e21eef0f8c0 openssh-3.9p1-8.RHEL4.12.x86_64.rpm
74fb1a3069203034430479b873e229e5 openssh-askpass-3.9p1-8.RHEL4.12.x86_64.rpm
9eaf5f509a4442aa921751a73bd29e94
openssh-askpass-gnome-3.9p1-8.RHEL4.12.x86_64.rpm
08f183cef545498fc81ee61fba9e5ef5 openssh-clients-3.9p1-8.RHEL4.12.x86_64.rpm
eda71f6f994a92a323058e9e8c2ba4f9 openssh-server-3.9p1-8.RHEL4.12.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
openssh-3.9p1-8.RHEL4.12.src.rpm
2578e547e59c73fdca370de8e98c5503 openssh-3.9p1-8.RHEL4.12.src.rpm

i386:
21757cc7559d10b6c0d129ad09f7457b openssh-3.9p1-8.RHEL4.12.i386.rpm
d8f08434752602146534024a54d8597e openssh-askpass-3.9p1-8.RHEL4.12.i386.rpm
73f9af460966644a1996be486cbd2cfc
openssh-askpass-gnome-3.9p1-8.RHEL4.12.i386.rpm
d753e37401a9a8bc837232c8c04565fe openssh-clients-3.9p1-8.RHEL4.12.i386.rpm
ed7c9a6d9dcdb8104da21f65fb318c8f openssh-server-3.9p1-8.RHEL4.12.i386.rpm

ia64:
4e7aa26129bf1905d97faf99b8e116b4 openssh-3.9p1-8.RHEL4.12.ia64.rpm
9d66c16e57e3c21b3678dd12d1851f10 openssh-askpass-3.9p1-8.RHEL4.12.ia64.rpm
11ff74898dfe0ace6fc2f0ff5e89c24c
openssh-askpass-gnome-3.9p1-8.RHEL4.12.ia64.rpm
70fc3a2a4b8f641203673b1f62282c33 openssh-clients-3.9p1-8.RHEL4.12.ia64.rpm
de9c83fa4b93dea3f8d42b4df4fd569a openssh-server-3.9p1-8.RHEL4.12.ia64.rpm

x86_64:
538abab594c138be17494e21eef0f8c0 openssh-3.9p1-8.RHEL4.12.x86_64.rpm
74fb1a3069203034430479b873e229e5 openssh-askpass-3.9p1-8.RHEL4.12.x86_64.rpm
9eaf5f509a4442aa921751a73bd29e94
openssh-askpass-gnome-3.9p1-8.RHEL4.12.x86_64.rpm
08f183cef545498fc81ee61fba9e5ef5 openssh-clients-3.9p1-8.RHEL4.12.x86_64.rpm
eda71f6f994a92a323058e9e8c2ba4f9 openssh-server-3.9p1-8.RHEL4.12.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0225

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFEDazXXlSAg2UNWIIRAkphAJ0e9KUzL6k9eOGPJhvsVEBO5QsOSwCgxFuZ
IU5oJG72XokzmajCWtsbLX8=
=hiLc
-----END PGP SIGNATURE-----


--
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung