[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Sheflug] ISS Advisory: OpenSSH Remote Challenge Vulnerability (fwd)




Hmm...an alerts list I'm not on, but had this forwarded to me. Anyone use
*BSD on here? However note that it does say that "...other OpenSSH
implementations may be vulnerable to a remote, superuser compromise."

Apols for sending these security alerts, but these tend to be rather
widespread programs :)

Chris...


---------- Forwarded message ----------
Date: Wed, 26 Jun 2002 09:55:50 -0400 (EDT)
From: X-Force <xxxxx [at] iss.net>
To: alert [at] iss.net
Subject: ISS Advisory: OpenSSH Remote Challenge Vulnerability


TO UNSUBSCRIBE: email "unsubscribe alert" in the body of your message to
majordomo@iss.net  Contact alert-owner [at] iss.net for help with any problems!
---------------------------------------------------------------------------

-----BEGIN PGP SIGNED MESSAGE-----

Internet Security Systems Security Advisory
June 26, 2002

OpenSSH Remote Challenge Vulnerability

Synopsis:

ISS X-Force has discovered a serious vulnerability in the default
installation of OpenSSH on the OpenBSD operating system. OpenSSH is a free
version of the SSH (Secure Shell) communications suite and is used as a
secure replacement for protocols such as Telnet, Rlogin, Rsh, and Ftp.
OpenSSH employs end-to-end encryption (including all passwords) and is
resistant to network monitoring, eavesdropping, and connection
hijacking attacks. X-Force is aware of active exploit development for this
vulnerability.

Impact:

OpenBSD, FreeBSD-Current, and other OpenSSH implementations may be
vulnerable to a remote, superuser compromise.

Affected Versions:

OpenBSD 3.0
OpenBSD 3.1
FreeBSD-Current
OpenSSH 3.0-3.2.3

OpenSSH version 3.3 implements "privilege separation" which mitigates the
risk of a superuser compromise. Prior to the release of this
advisory, ISS and OpenBSD encouraged all OpenSSH users to upgrade to
version 3.3. Versions of FreeBSD-Current built between March 18, 2002 and
June 23, 2002 are vulnerable to remote superuser compromise.
Privilege separation was implemented in FreeBSD-Current on June 23, 2002.

Note: OpenSSH is included in many operating system distributions,
networking equipment, and security appliances. Refer to the following
address for information about vendors that implement OpenSSH:
http://www.openssh.com/users.html

Description:

A vulnerability exists within the "challenge-response" authentication
mechanism in the OpenSSH daemon (sshd). This mechanism, part of the SSH2
protocol, verifies a user's identity by generating a challenge and forcing
the user to supply a number of responses. It is possible for a remote
attacker to send a specially-crafted reply that triggers an overflow. This
can result in a remote denial of service attack on the OpenSSH daemon or a
complete remote compromise. The OpenSSH daemon runs with superuser
privilege, so remote attackers can gain superuser access by exploiting this
vulnerability.

OpenSSH supports the SKEY and BSD_AUTH authentication options. These are
compile-time options. At least one of these options must be enabled before
the OpenSSH binaries are compiled for the vulnerable condition to be
present. OpenBSD 3.0 and later is distributed with BSD_AUTH enabled. The
SKEY and BSD_AUTH options are not enabled by default in many
distributions. However, if these options are explicitly enabled, that build
of OpenSSH may be vulnerable.

Recommendations:

Internet Scanner X-Press Update 6.13 includes a check, OpenSshRunning, to
detect potentially vulnerable installations of OpenSSH. XPU 6.13 is
available from the ISS Download Center at: http://www.iss.net/download. For
questions about downloading and installing this XPU, email
support@iss.net.

ISS X-Force recommends that system administrators disable unused OpenSSH
authentication mechanisms. Administrators can remove this vulnerability by
disabling the Challenge-Response authentication parameter within the
OpenSSH daemon configuration file. This filename and path is typically:
/etc/ssh/sshd_config. To disable this parameter, locate the
corresponding line and change it to the line below:

ChallengeResponseAuthentication no

The "sshd" process must be restarted for this change to take effect. This
workaround will permanently remove the vulnerability. X-Force recommends
that administrators upgrade to OpenSSH version 3.4
immediately. This version implements privilege separation, contains a patch
to block this vulnerability, and contains many additional pro- active
security fixes. Privilege separation was designed to limit
exposure to known and unknown vulnerabilities. Visit
http://www.openssh.com for more information.

Additional Information:

ISS X-Force and Black Hat consulting will host a presentation titled,
"Professional Source Code Auditing" at Black Hat Briefings USA 2002. The
presentation will explore advanced source code auditing techniques as well
as secure development best-practices. Please refer to
http://www.blackhat.com and
http://www.blackhat.com/html/bh-usa-02/bh-usa-02-speakers.html#Dowd for
more information.

Credits:

The vulnerability described in this advisory was discovered and
researched by Mark Dowd of the ISS X-Force. ISS would like to thank Theo de
Raadt of the OpenBSD Project for his assistance with this advisory.



______

About Internet Security Systems (ISS)
Founded in 1994, Internet Security Systems (ISS) (Nasdaq: ISSX) is a
pioneer and world leader in software and services that protect critical
online resources from an ever-changing spectrum of threats and misuse.
Internet Security Systems is headquartered in Atlanta, GA, with
additional operations throughout the Americas, Asia, Australia, Europe and
the Middle East.

Copyright (c) 2002 Internet Security Systems, Inc. All rights reserved
worldwide.

Permission is hereby granted for the electronic redistribution of this
document. It is not to be edited or altered in any way without the express
written consent of the Internet Security Systems X-Force. If you wish to
reprint the whole or any part of this document in any other medium
excluding electronic media, please email xforce [at] iss.net for permission.

Disclaimer: The information within this paper may change without notice.
Use of this information constitutes acceptance for use in an AS IS
condition. There are NO warranties, implied or otherwise, with regard to
this information or its use. Any use of this information is at the user's
risk. In no event shall the author/distributor (Internet Security Systems
X-Force) be held liable for any damages whatsoever arising out of or in
connection with the use or spread of this information.

X-Force PGP Key available on MIT's PGP key server and PGP.com's key server,
as well as at http://www.iss.net/security_center/sensitive.php

Please send suggestions, updates, and comments to: X-Force

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBPRnHMDRfJiV99eG9AQHc3wQApUjGfFHFybhfo8vCqlNZ63eEu7ehQyiF
lrufj/P7q2cFY/VLICepeDtLhP52bcchNm3WTlaIT3wWLnZzObvgtabHOIax0Z7t
oob/Li9+NTB2abwvQiFoX37DPmbhFJ6p1UxgfvVQ6+77nPZse/ID+EFSwLVGL45t
ak0sHKrvD0o=
=MfYf
-----END PGP SIGNATURE-----


-- 
\ Chris Johnson                 \
 \ cej [at] nightwolf.org.uk          \
  \ http://cej.nightwolf.org.uk/  ~-----------------------------------+
   \ Redclaw chat - http://redclaw.org.uk - telnet redclaw.org.uk 2000 \____



___________________________________________________________________

Sheffield Linux User's Group -
http://www.sheflug.co.uk/mailfaq.html

  GNU the choice of a complete generation.