__________________________________________________________
The U.S. Department of Energy
Computer Incident Advisory Capability
___ __ __ _ ___
/ | /_\ /
\___ __|__ / \ \___
__________________________________________________________
INFORMATION BULLETIN
CERT: Portable OpenSSH server PAM Vulnerability
[Vulnerability Note VU#209807]
September 30, 2003 18:00 GMT Number N-158
______________________________________________________________________________
PROBLEM: A vulnerability in the Portable OpenSSH server that may corrupt
the PAM conversion stack.
PLATFORM: OpenSSH 3.7.1p1 (portable)
DAMAGE: The complete impact of this vulnerability is not yet known, but
may lead to privilege escalation, or a denial of service.
SOLUTION: Change the config file or apply upgrades.
(Note--changing the config file for CIAC N-157 CERT OpenSSH
PAM challenge authentication failure, fixes this.)
______________________________________________________________________________
VULNERABILITY The risk is MEDIUM. The complete impact of this vulnerability
ASSESSMENT: is not yet known, but may lead to privilege escalation, or a
denial of service.
______________________________________________________________________________
LINKS:
CIAC BULLETIN: http://www.ciac.org/ciac/bulletins/n-158.shtml
ORIGINAL BULLETIN: http://www.kb.cert.org/vuls/id/209807
______________________________________________________________________________
[***** Start Vulnerability Note VU#209807 *****]
Vulnerability Note VU#209807
Portable OpenSSH server PAM conversion stack corruption
Overview
There is a vulnerability in the Portable OpenSSH server that may corrupt the PAM
conversion stack.
I. Description
The Portable OpenSSH server contains a vulnerability that may permit an attacker to
corrupt the PAM conversion stack. Versions 3.7p1 and 3.7.1p1 are affected. Note that
the OpenBSD-specific releases are not affected by this issue.
II. Impact
The complete impact of this vulnerability is not yet known, but may lead to privilege
escalation, or a denial of service.
III. Solution
OpenSSH has announced version 3.7.1p2 to resolve this issue.
This issue can be mitigated by not using PAM. Set "UsePAM no" in sshd_config.
Systems Affected
Vendor Status Date Updated
OpenSSH Vulnerable 24-Sep-2003
References
http://marc.theaimsgroup.com/?l=openbsd-misc&m=106432248311634&w=2
http://www.openssh.com/txt/sshpam.adv
Credit
Thanks to OpenSSH for reporting this vulnerability.
This document was written by Jason A Rafail.
Other Information
Date Public 09/23/2003
Date First Published 09/24/2003 11:06:09 AM
Date Last Updated 09/24/2003
CERT Advisory
CVE Name CAN-2003-0787
Metric 1.50
Document Revision 2
[***** End Vulnerability Note VU#209807 *****]
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH