[lug] Openssh exploit
Scott A. Herod
herod at interact-tv.com
Fri Mar 8 11:15:12 MST 2002
BTW, I've been watching RedHat for an update from them. It looks
like they're thinking about it. A link on their errata pages keeps
coming and going, but when it's there, it points to a missing page
(error 404).
Scott
Neal McBurnett wrote:
>
> On Fri, Mar 08, 2002 at 10:43:01AM -0700, Neal McBurnett wrote:
> > On Thu, Mar 07, 2002 at 10:42:48AM -0700, Scott A. Herod wrote:
> > > A root exploit to Openssh was just announced. www.openssh.org
> > > has new rpms. The exploit is reported as local only
> > >
> > > http://www.openbsd.org/advisories/ssh_channelalloc.txt
> > >
> > > Scott
> >
> > This "remote" vs "local" distinction is confusing in this case.
> >
> > The bottom line is that if someone has ssh access to any machine that
> > is connected, transitively over time, with your machine, your machine
> > could be at their disposal if they do a series of attacks.
>
> Rereading that I think the "transitive" notion is a bit confusing.
>
> Scenario: someone with an account at sourceforge attacks sourceforge,
> gets root and modifies their sshd (or perhaps even just stealthily
> attacks the running sshd process....). A colleague connects to
> sourceforge and their id is compromised. They (or an ssh worm)
> connects to your machine and your machine is compromised, etc.
>
> I haven't heard of wild exploits, but it sure sounds like a
> potentially bigger risk than it might seem at first....
>
> -Neal
>
> > Here is a better description:
> >
> > Joost Pol discovered an off-by-one bug in a routine in the openssh
> > code for checking channel IDs. This bug can be exploited on the
> > remote side by an already authenticated user, qualifying this bug
> > as a local security vulnerability, and on the local side if a
> > malicious server attacks the connected client, qualifying this bug
> > as a remote vulnerability. If the error is being exploited, it
> > leads to arbitrary code execution in the process under attack
> > (either a local ssh client, attacking the userID of the client
> > user, or a remote secure shell daemon that has an authenticated
> > user session running, attacking the root account of the remote
> > system).
> > Please note that the possible attack scenario is different from
> > the usual attack scheme because "local vulnerability" refers to
> > the remote side and vice versa.
> >
> > There is no temporary workaround for this bug. If you comply to
> > the following two conditions, the impact of the error is
> > considerably small:
> >
> > 1) You only connect to hosts that you consider fully trusted
> > and not compromised.
> >
> > 2) The users that connect to your servers are fully trusted
> > (the users have root access, for instance).
> >
> > Neal McBurnett <neal at bcn.boulder.co.us>
> > http://bcn.boulder.co.us/~neal/
> > GPG/PGP signed and/or sealed mail encouraged. Keyid: 2C9EBA60
More information about the LUG
mailing list