Skip to comments.
Guess What? Serious Flaw Found in OpenSSH
CERT ^
| 9/16/2003
| CERT (Jason A Rafail)
Posted on 09/16/2003 6:50:50 PM PDT by Bush2000
CERT Advisory
Vulnerability Note VU#333628
OpenSSH contains a buffer management error
Some versions of the OpenSSH server contain a buffer management error. While the full impact of this vulnerability is unclear, this may lead to memory corruption and a denial of service situation.
(Excerpt) Read more at kb.cert.org ...
TOPICS: Technical
KEYWORDS: openssh
Navigation: use the links below to view more comments.
first 1-20, 21-40, 41-60, 61-73 next last
1
posted on
09/16/2003 6:50:51 PM PDT
by
Bush2000
To: Bush2000
Heh heeeeeeeeee....
2
posted on
09/16/2003 6:52:44 PM PDT
by
TomServo
("Upon further review, the refs find that Cody is dead. The play stands -- Cody is dead.")
To: Bush2000
To: Bush2000
And every organization that uses OpenSSH based on the possibly buggy code were able to get a patch along with the source code of the program in less than a day, free of charge. Most distributions of Unix and Linux do not have "sshd" turned on by default unlike Microsoft's DCOM system that allowed Blaster and Nachi easily infect thousands upon thousands of computers.
Not that I am complaining about Microsoft, Bill's buggy OS pays my bills.
4
posted on
09/16/2003 7:06:19 PM PDT
by
toupsie
To: shadowman99
What is SSH? and does this have any signifigance to the normal computer using peon?
5
posted on
09/16/2003 7:08:27 PM PDT
by
Cheapskate
(Cali"; Behold The Glory Of, Of the Royal Scam")
To: rdb3
Pinging the Penguin Pinger.
Thanks, b2k.
Damn, I hate patching stuff. :-)
6
posted on
09/16/2003 7:11:53 PM PDT
by
Salo
To: Cheapskate
Think of it as a secure version of telnet. It will most likely not affect you.
7
posted on
09/16/2003 7:13:09 PM PDT
by
Salo
To: Cheapskate
SSH is secure shell. It is a method to "securely" communicate to a Unix or Unix-like operating system -- it can run on a Windows system using cygwin. For sysadmins, it is a very handy tool for managing Unix or Unix-like servers and to establish secure channels of communication over the Internet or other untrusted networks. Most of the time, the interaction with the program is text based like old "dumb" terminals.
That's about as basic of a description I can give of SSH. It really is an amazing program with lots of features but you really have understand what it does to use it to its fullest.
8
posted on
09/16/2003 7:13:14 PM PDT
by
toupsie
To: Salo
It actually does a lot more than telnet but that is a really good basic description of SSH. Just hope that Cheapskate knows what telnet is! :P
9
posted on
09/16/2003 7:14:44 PM PDT
by
toupsie
To: Salo
thanks I really doubt it. Usin an E machine with 98
10
posted on
09/16/2003 7:16:26 PM PDT
by
Cheapskate
(Cali"; Behold The Glory Of, Of the Royal Scam")
To: toupsie
And every organization that uses OpenSSH based on the possibly buggy code were able to get a patch along with the source code of the program in less than a day, free of charge. The irony....
BTW - it wasn't "possibly" buggy, it was. They wouldn't have had to release a patch if it wasn't. I'd like to use that the next time my programming team gets pegged for a bug, "well, if you didn't use that feature, then you wouldn't have a bug"... LMAO
11
posted on
09/16/2003 7:16:29 PM PDT
by
RedWing9
(No tag here... Just want to stay vague...)
To: Bush2000
Um, actually there are no confirmed reports at this point of being able to actually cause a crash or break in to the system. However, because there is the possibility of that happening, they have released the patch.
12
posted on
09/16/2003 7:24:17 PM PDT
by
ikka
To: Bush2000
And gosh... I updated all my production machines today without any downtime to customers. No reboot required. Can't say that about weekly MS patches.
13
posted on
09/16/2003 7:27:00 PM PDT
by
sigSEGV
To: sigSEGV
ping
And I updated machines in several states - no reboot - no interuption of service and within hours, not weeks, as some in Redmond seem to think is soon enough.
14
posted on
09/16/2003 7:34:46 PM PDT
by
paulk
To: RedWing9
All versions of OpenSSH's sshd prior to 3.7.1 contain buffer management errors. It is uncertain whether these errors are potentially exploitable, however, we prefer to see bugs fixed proactively. They were being proactive on a non-default package instead of being reactive to a default package like Microsoft. Don't get me wrong. I benefit financially from Microsoft's poor record on security. Microsoft's inability to produce a secure operating system puts food on my table.
15
posted on
09/16/2003 7:52:08 PM PDT
by
toupsie
To: sigSEGV
You aren't kidding! I can't figure out for the life of me why Microsoft can't patch a system without it requiring a reboot. Why do I need to reboot a server to upgrade it's web browser component? When I patch or upgrade Unix systems, 99% of the time all I am doing is downing a process in memory and replacing it. The only time I can think of that I reboot Unix servers is for kernel upgrade which is once every few years.
16
posted on
09/16/2003 7:55:58 PM PDT
by
toupsie
To: John Robinson; B Knotts; stainlessbanner; TechJunkYard; ShadowAce; Knitebane; AppyPappy; jae471; ...
The Penguin Ping.
Wanna be Penguified? Just holla!

Got root?
17
posted on
09/16/2003 8:08:11 PM PDT
by
rdb3
(Which is more powerful: The story or the warrior?)
To: toupsie
You aren't kidding! I can't figure out for the life of me why Microsoft can't patch a system without it requiring a reboot.... When I patch or upgrade Unix systems, 99% of the time all I am doing is downing a process in memory and replacing it. Microsoft doesn't know how to take down and restart processes without creating system instability.
18
posted on
09/16/2003 8:11:00 PM PDT
by
supercat
(TAG--you're it!)
To: toupsie
Well, let's be completely honest. If you want remote login tools, the best "common" option is ssh, and the best free option in that regard is OpenSSH. Also, it's not a possible exploit, it's a real one -- though that wasn't confirmed until after the code was patched (the exploit wasn't released until after 3.7 was released, probably as a test to see if the suspected exploit fixed in the update really was a problem).
19
posted on
09/16/2003 8:13:52 PM PDT
by
Dimensio
(Sometimes I doubt your committment to Sparkle Motion!)
To: supercat
Microsoft doesn't know how to take down and restart processes without creating system instability.That sounds like a pretty big deficiency.
20
posted on
09/16/2003 8:16:04 PM PDT
by
Petronski
(Calm down. Eat some fruit or something.)
Navigation: use the links below to view more comments.
first 1-20, 21-40, 41-60, 61-73 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson