Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Guess What? Serious Flaw Found in OpenSSH
CERT ^ | 9/16/2003 | CERT (Jason A Rafail)

Posted on 09/16/2003 6:50:50 PM PDT by Bush2000

CERT Advisory
Vulnerability Note VU#333628
OpenSSH contains a buffer management error


Some versions of the OpenSSH server contain a buffer management error. While the full impact of this vulnerability is unclear, this may lead to memory corruption and a denial of service situation.

(Excerpt) Read more at kb.cert.org ...


TOPICS: Technical
KEYWORDS: openssh
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-73 next last

1 posted on 09/16/2003 6:50:51 PM PDT by Bush2000
[ Post Reply | Private Reply | View Replies]

To: Bush2000
Heh heeeeeeeeee....
2 posted on 09/16/2003 6:52:44 PM PDT by TomServo ("Upon further review, the refs find that Cody is dead. The play stands -- Cody is dead.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bush2000
The OpenSSH developement team has developed patches and an advisory for this issue. More details will be available at

http://www.openssh.com/txt/buffer.adv
3 posted on 09/16/2003 7:01:52 PM PDT by shadowman99
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bush2000
And every organization that uses OpenSSH based on the possibly buggy code were able to get a patch along with the source code of the program in less than a day, free of charge. Most distributions of Unix and Linux do not have "sshd" turned on by default unlike Microsoft's DCOM system that allowed Blaster and Nachi easily infect thousands upon thousands of computers.

Not that I am complaining about Microsoft, Bill's buggy OS pays my bills.

4 posted on 09/16/2003 7:06:19 PM PDT by toupsie
[ Post Reply | Private Reply | To 1 | View Replies]

To: shadowman99
What is SSH? and does this have any signifigance to the normal computer using peon?
5 posted on 09/16/2003 7:08:27 PM PDT by Cheapskate (Cali"; Behold The Glory Of, Of the Royal Scam")
[ Post Reply | Private Reply | To 3 | View Replies]

To: rdb3
Pinging the Penguin Pinger.

Thanks, b2k.

Damn, I hate patching stuff. :-)
6 posted on 09/16/2003 7:11:53 PM PDT by Salo
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cheapskate
Think of it as a secure version of telnet. It will most likely not affect you.
7 posted on 09/16/2003 7:13:09 PM PDT by Salo
[ Post Reply | Private Reply | To 5 | View Replies]

To: Cheapskate
SSH is secure shell. It is a method to "securely" communicate to a Unix or Unix-like operating system -- it can run on a Windows system using cygwin. For sysadmins, it is a very handy tool for managing Unix or Unix-like servers and to establish secure channels of communication over the Internet or other untrusted networks. Most of the time, the interaction with the program is text based like old "dumb" terminals.

That's about as basic of a description I can give of SSH. It really is an amazing program with lots of features but you really have understand what it does to use it to its fullest.

8 posted on 09/16/2003 7:13:14 PM PDT by toupsie
[ Post Reply | Private Reply | To 5 | View Replies]

To: Salo
It actually does a lot more than telnet but that is a really good basic description of SSH. Just hope that Cheapskate knows what telnet is! :P
9 posted on 09/16/2003 7:14:44 PM PDT by toupsie
[ Post Reply | Private Reply | To 7 | View Replies]

To: Salo
thanks I really doubt it. Usin an E machine with 98
10 posted on 09/16/2003 7:16:26 PM PDT by Cheapskate (Cali"; Behold The Glory Of, Of the Royal Scam")
[ Post Reply | Private Reply | To 7 | View Replies]

To: toupsie
And every organization that uses OpenSSH based on the possibly buggy code were able to get a patch along with the source code of the program in less than a day, free of charge.

The irony....

BTW - it wasn't "possibly" buggy, it was. They wouldn't have had to release a patch if it wasn't. I'd like to use that the next time my programming team gets pegged for a bug, "well, if you didn't use that feature, then you wouldn't have a bug"... LMAO

11 posted on 09/16/2003 7:16:29 PM PDT by RedWing9 (No tag here... Just want to stay vague...)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Bush2000
Um, actually there are no confirmed reports at this point of being able to actually cause a crash or break in to the system. However, because there is the possibility of that happening, they have released the patch.
12 posted on 09/16/2003 7:24:17 PM PDT by ikka
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bush2000
And gosh... I updated all my production machines today without any downtime to customers. No reboot required. Can't say that about weekly MS patches.
13 posted on 09/16/2003 7:27:00 PM PDT by sigSEGV
[ Post Reply | Private Reply | To 1 | View Replies]

To: sigSEGV
ping

And I updated machines in several states - no reboot - no interuption of service and within hours, not weeks, as some in Redmond seem to think is soon enough.
14 posted on 09/16/2003 7:34:46 PM PDT by paulk
[ Post Reply | Private Reply | To 13 | View Replies]

To: RedWing9
All versions of OpenSSH's sshd prior to 3.7.1 contain buffer management errors. It is uncertain whether these errors are potentially exploitable, however, we prefer to see bugs fixed proactively.

They were being proactive on a non-default package instead of being reactive to a default package like Microsoft. Don't get me wrong. I benefit financially from Microsoft's poor record on security. Microsoft's inability to produce a secure operating system puts food on my table.

15 posted on 09/16/2003 7:52:08 PM PDT by toupsie
[ Post Reply | Private Reply | To 11 | View Replies]

To: sigSEGV
You aren't kidding! I can't figure out for the life of me why Microsoft can't patch a system without it requiring a reboot. Why do I need to reboot a server to upgrade it's web browser component? When I patch or upgrade Unix systems, 99% of the time all I am doing is downing a process in memory and replacing it. The only time I can think of that I reboot Unix servers is for kernel upgrade which is once every few years.
16 posted on 09/16/2003 7:55:58 PM PDT by toupsie
[ Post Reply | Private Reply | To 13 | View Replies]

To: John Robinson; B Knotts; stainlessbanner; TechJunkYard; ShadowAce; Knitebane; AppyPappy; jae471; ...
The Penguin Ping.

Wanna be Penguified? Just holla!

Got root?

17 posted on 09/16/2003 8:08:11 PM PDT by rdb3 (Which is more powerful: The story or the warrior?)
[ Post Reply | Private Reply | To 6 | View Replies]

To: toupsie
You aren't kidding! I can't figure out for the life of me why Microsoft can't patch a system without it requiring a reboot.... When I patch or upgrade Unix systems, 99% of the time all I am doing is downing a process in memory and replacing it.

Microsoft doesn't know how to take down and restart processes without creating system instability.

18 posted on 09/16/2003 8:11:00 PM PDT by supercat (TAG--you're it!)
[ Post Reply | Private Reply | To 16 | View Replies]

To: toupsie
Well, let's be completely honest. If you want remote login tools, the best "common" option is ssh, and the best free option in that regard is OpenSSH. Also, it's not a possible exploit, it's a real one -- though that wasn't confirmed until after the code was patched (the exploit wasn't released until after 3.7 was released, probably as a test to see if the suspected exploit fixed in the update really was a problem).
19 posted on 09/16/2003 8:13:52 PM PDT by Dimensio (Sometimes I doubt your committment to Sparkle Motion!)
[ Post Reply | Private Reply | To 4 | View Replies]

To: supercat
Microsoft doesn't know how to take down and restart processes without creating system instability.

That sounds like a pretty big deficiency.

20 posted on 09/16/2003 8:16:04 PM PDT by Petronski (Calm down. Eat some fruit or something.)
[ Post Reply | Private Reply | To 18 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-73 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson