[lug] Openssh exploit
Neal McBurnett
neal at bcn.boulder.co.us
Fri Mar 8 11:16:57 MST 2002
On Fri, Mar 08, 2002 at 10:43:01AM -0700, Neal McBurnett wrote:
> On Thu, Mar 07, 2002 at 10:42:48AM -0700, Scott A. Herod wrote:
> > A root exploit to Openssh was just announced. www.openssh.org
> > has new rpms. The exploit is reported as local only
> >
> > http://www.openbsd.org/advisories/ssh_channelalloc.txt
> >
> > Scott
>
> This "remote" vs "local" distinction is confusing in this case.
>
> The bottom line is that if someone has ssh access to any machine that
> is connected, transitively over time, with your machine, your machine
> could be at their disposal if they do a series of attacks.
Rereading that I think the "transitive" notion is a bit confusing.
Scenario: someone with an account at sourceforge attacks sourceforge,
gets root and modifies their sshd (or perhaps even just stealthily
attacks the running sshd process....). A colleague connects to
sourceforge and their id is compromised. They (or an ssh worm)
connects to your machine and your machine is compromised, etc.
I haven't heard of wild exploits, but it sure sounds like a
potentially bigger risk than it might seem at first....
-Neal
> Here is a better description:
>
> Joost Pol discovered an off-by-one bug in a routine in the openssh
> code for checking channel IDs. This bug can be exploited on the
> remote side by an already authenticated user, qualifying this bug
> as a local security vulnerability, and on the local side if a
> malicious server attacks the connected client, qualifying this bug
> as a remote vulnerability. If the error is being exploited, it
> leads to arbitrary code execution in the process under attack
> (either a local ssh client, attacking the userID of the client
> user, or a remote secure shell daemon that has an authenticated
> user session running, attacking the root account of the remote
> system).
> Please note that the possible attack scenario is different from
> the usual attack scheme because "local vulnerability" refers to
> the remote side and vice versa.
>
> There is no temporary workaround for this bug. If you comply to
> the following two conditions, the impact of the error is
> considerably small:
>
> 1) You only connect to hosts that you consider fully trusted
> and not compromised.
>
> 2) The users that connect to your servers are fully trusted
> (the users have root access, for instance).
>
> Neal McBurnett <neal at bcn.boulder.co.us>
> http://bcn.boulder.co.us/~neal/
> GPG/PGP signed and/or sealed mail encouraged. Keyid: 2C9EBA60
> _______________________________________________
> Web Page: http://lug.boulder.co.us
> Mailing List: http://lists.lug.boulder.co.us/mailman/listinfo/lug
More information about the LUG
mailing list