FreeBSD Security Advisories
2006-Sep-30 13:24 UTC
[FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-06:22.openssh
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================FreeBSD-SA-06:22.openssh Security Advisory The FreeBSD Project Topic: Multiple vulnerabilities in OpenSSH Category: contrib Module: openssh Announced: 2006-09-30 Credits: Tavis Ormandy, Mark Dowd Affects: All FreeBSD releases. Corrected: 2006-09-30 19:50:57 UTC (RELENG_6, 6.2-PRERELEASE) 2006-09-30 19:51:56 UTC (RELENG_6_1, 6.1-RELEASE-p10) 2006-09-30 19:53:21 UTC (RELENG_6_0, 6.0-RELEASE-p15) 2006-09-30 19:54:03 UTC (RELENG_5, 5.5-STABLE) 2006-09-30 19:54:58 UTC (RELENG_5_5, 5.5-RELEASE-p8) 2006-09-30 19:55:52 UTC (RELENG_5_4, 5.4-RELEASE-p22) 2006-09-30 19:56:38 UTC (RELENG_5_3, 5.3-RELEASE-p37) 2006-09-30 19:57:15 UTC (RELENG_4, 4.11-STABLE) 2006-09-30 19:58:07 UTC (RELENG_4_11, 4.11-RELEASE-p25) CVE Name: CVE-2006-4924, CVE-2006-5051 For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit <URL:http://security.FreeBSD.org/>. I. Background OpenSSH is an implementation of the SSH protocol suite, providing an encrypted, authenticated transport for a variety of services, including remote shell access. II. Problem Description The CRC compensation attack detector in the sshd(8) daemon, upon receipt of duplicate blocks, uses CPU time cubic in the number of duplicate blocks received. [CVE-2006-4924] A race condition exists in a signal handler used by the sshd(8) daemon to handle the LoginGraceTime option, which can potentially cause some cleanup routines to be executed multiple times. [CVE-2006-5051] III. Impact An attacker sending specially crafted packets to sshd(8) can cause a Denial of Service by using 100% of CPU time until a connection timeout occurs. Since this attack can be performed over multiple connections simultaneously, it is possible to cause up to MaxStartups (10 by default) sshd processes to use all the CPU time they can obtain. [CVE-2006-4924] The OpenSSH project believe that the race condition can lead to a Denial of Service or potentially remote code execution, but the FreeBSD Security Team has been unable to verify the exact impact. [CVE-2006-5051] IV. Workaround The attack against the CRC compensation attack detector can be avoided by disabling SSH Protocol version 1 support in sshd_config(5). There is no workaround for the second issue. V. Solution Perform one of the following: 1) Upgrade your vulnerable system to 4-STABLE, 5-STABLE, or 6-STABLE, or to the RELENG_6_1, RELENG_6_0, RELENG_5_5, RELENG_5_4, RELENG_5_3, or RELENG_4_11 security branch dated after the correction date. 2) To patch your present system: The following patches have been verified to apply to FreeBSD 4.11, 5.3, 5.4, 5.5, 6.0, and 6.1 systems. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. [FreeBSD 4.11] # fetch http://security.FreeBSD.org/patches/SA-06:22/openssh4x.patch # fetch http://security.FreeBSD.org/patches/SA-06:22/openssh4x.patch.asc [FreeBSD 5.x] # fetch http://security.FreeBSD.org/patches/SA-06:22/openssh5x.patch # fetch http://security.FreeBSD.org/patches/SA-06:22/openssh5x.patch.asc [FreeBSD 6.x] # fetch http://security.FreeBSD.org/patches/SA-06:22/openssh6x.patch # fetch http://security.FreeBSD.org/patches/SA-06:22/openssh6x.patch.asc b) Execute the following commands as root: # cd /usr/src # patch < /path/to/patch # cd /usr/src/secure/lib/libssh # make obj && make depend && make && make install # cd /usr/src/secure/usr.sbin/sshd # make obj && make depend && make && make install c) Restart the SSH daemon. On FreeBSD 5.x and 6.x, this can be done via # /etc/rc.d/sshd restart VI. Correction details The following list contains the revision numbers of each file that was corrected in FreeBSD. Branch Revision Path - ------------------------------------------------------------------------- RELENG_4 src/crypto/openssh/deattack.c 1.1.1.1.2.6 src/crypto/openssh/deattack.h 1.1.1.1.2.3 src/crypto/openssh/defines.h 1.1.1.2.2.3 src/crypto/openssh/log.c 1.1.1.1.2.6 src/crypto/openssh/log.h 1.1.1.1.2.4 src/crypto/openssh/packet.c 1.1.1.1.2.7 src/crypto/openssh/ssh_config 1.2.2.10 src/crypto/openssh/ssh_config.5 1.4.2.6 src/crypto/openssh/sshd.c 1.6.2.12 src/crypto/openssh/sshd_config 1.4.2.14 src/crypto/openssh/sshd_config.5 1.5.2.8 src/crypto/openssh/version.h 1.1.1.1.2.14 RELENG_4_11 src/UPDATING 1.73.2.91.2.26 src/sys/conf/newvers.sh 1.44.2.39.2.29 src/crypto/openssh/deattack.c 1.1.1.1.2.5.6.1 src/crypto/openssh/deattack.h 1.1.1.1.2.2.10.1 src/crypto/openssh/defines.h 1.1.1.2.2.2.8.1 src/crypto/openssh/log.c 1.1.1.1.2.5.8.1 src/crypto/openssh/log.h 1.1.1.1.2.3.8.1 src/crypto/openssh/packet.c 1.1.1.1.2.6.8.1 src/crypto/openssh/ssh_config 1.2.2.9.6.1 src/crypto/openssh/ssh_config.5 1.4.2.5.6.1 src/crypto/openssh/sshd.c 1.6.2.11.8.1 src/crypto/openssh/sshd_config 1.4.2.13.6.1 src/crypto/openssh/sshd_config.5 1.5.2.7.4.1 src/crypto/openssh/version.h 1.1.1.1.2.13.6.1 RELENG_5 src/crypto/openssh/auth.h 1.13.2.1 src/crypto/openssh/deattack.c 1.1.1.7.2.1 src/crypto/openssh/deattack.h 1.1.1.3.8.1 src/crypto/openssh/defines.h 1.1.1.7.2.1 src/crypto/openssh/log.c 1.1.1.10.2.1 src/crypto/openssh/log.h 1.5.2.1 src/crypto/openssh/packet.c 1.1.1.14.2.1 src/crypto/openssh/session.c 1.44.2.1 src/crypto/openssh/ssh_config 1.25.2.2 src/crypto/openssh/ssh_config.5 1.15.2.2 src/crypto/openssh/sshd.c 1.37.2.1 src/crypto/openssh/sshd_config 1.40.2.2 src/crypto/openssh/sshd_config.5 1.21.2.2 src/crypto/openssh/version.h 1.27.2.2 RELENG_5_5 src/UPDATING 1.342.2.35.2.8 src/sys/conf/newvers.sh 1.62.2.21.2.10 src/crypto/openssh/auth.h 1.13.8.1 src/crypto/openssh/deattack.c 1.1.1.7.14.1 src/crypto/openssh/deattack.h 1.1.1.3.20.1 src/crypto/openssh/defines.h 1.1.1.7.8.1 src/crypto/openssh/log.c 1.1.1.10.8.1 src/crypto/openssh/log.h 1.5.8.1 src/crypto/openssh/packet.c 1.1.1.14.8.1 src/crypto/openssh/session.c 1.44.8.1 src/crypto/openssh/ssh_config 1.25.2.1.2.1 src/crypto/openssh/ssh_config.5 1.15.2.1.2.1 src/crypto/openssh/sshd.c 1.37.8.1 src/crypto/openssh/sshd_config 1.40.2.1.2.1 src/crypto/openssh/sshd_config.5 1.21.2.1.2.1 src/crypto/openssh/version.h 1.27.2.1.2.1 RELENG_5_4 src/UPDATING 1.342.2.24.2.31 src/sys/conf/newvers.sh 1.62.2.18.2.27 src/crypto/openssh/auth.h 1.13.6.1 src/crypto/openssh/deattack.c 1.1.1.7.6.1 src/crypto/openssh/deattack.h 1.1.1.3.12.1 src/crypto/openssh/defines.h 1.1.1.7.6.1 src/crypto/openssh/log.c 1.1.1.10.6.1 src/crypto/openssh/log.h 1.5.6.1 src/crypto/openssh/packet.c 1.1.1.14.6.1 src/crypto/openssh/session.c 1.44.6.1 src/crypto/openssh/ssh_config 1.25.6.2 src/crypto/openssh/ssh_config.5 1.15.6.2 src/crypto/openssh/sshd.c 1.37.6.1 src/crypto/openssh/sshd_config 1.40.6.2 src/crypto/openssh/sshd_config.5 1.21.6.2 src/crypto/openssh/version.h 1.27.6.2 RELENG_5_3 src/UPDATING 1.342.2.13.2.40 src/sys/conf/newvers.sh 1.62.2.15.2.42 src/crypto/openssh/auth.h 1.13.4.1 src/crypto/openssh/deattack.c 1.1.1.7.4.1 src/crypto/openssh/deattack.h 1.1.1.3.10.1 src/crypto/openssh/defines.h 1.1.1.7.4.1 src/crypto/openssh/log.c 1.1.1.10.4.1 src/crypto/openssh/log.h 1.5.4.1 src/crypto/openssh/packet.c 1.1.1.14.4.1 src/crypto/openssh/session.c 1.44.4.1 src/crypto/openssh/ssh_config 1.25.4.2 src/crypto/openssh/ssh_config.5 1.15.4.2 src/crypto/openssh/sshd.c 1.37.4.1 src/crypto/openssh/sshd_config 1.40.4.2 src/crypto/openssh/sshd_config.5 1.21.4.2 src/crypto/openssh/version.h 1.27.4.2 RELENG_6 src/crypto/openssh/auth.h 1.15.2.2 src/crypto/openssh/deattack.c 1.1.1.7.8.1 src/crypto/openssh/deattack.h 1.1.1.3.14.1 src/crypto/openssh/defines.h 1.1.1.9.2.2 src/crypto/openssh/log.c 1.1.1.13.2.1 src/crypto/openssh/log.h 1.6.2.1 src/crypto/openssh/packet.c 1.1.1.16.2.2 src/crypto/openssh/session.c 1.46.2.2 src/crypto/openssh/ssh_config 1.27.2.2 src/crypto/openssh/ssh_config.5 1.17.2.2 src/crypto/openssh/sshd.c 1.39.2.2 src/crypto/openssh/sshd_config 1.42.2.2 src/crypto/openssh/sshd_config.5 1.23.2.2 src/crypto/openssh/version.h 1.30.2.2 RELENG_6_1 src/UPDATING 1.416.2.22.2.12 src/sys/conf/newvers.sh 1.69.2.11.2.12 src/crypto/openssh/auth.h 1.15.2.1.4.1 src/crypto/openssh/deattack.c 1.1.1.7.12.1 src/crypto/openssh/deattack.h 1.1.1.3.18.1 src/crypto/openssh/defines.h 1.1.1.9.2.1.4.1 src/crypto/openssh/log.c 1.1.1.13.6.1 src/crypto/openssh/log.h 1.6.6.1 src/crypto/openssh/packet.c 1.1.1.16.2.1.4.1 src/crypto/openssh/session.c 1.46.2.1.4.1 src/crypto/openssh/ssh_config 1.27.2.1.4.1 src/crypto/openssh/ssh_config.5 1.17.2.1.4.1 src/crypto/openssh/sshd.c 1.39.2.1.4.1 src/crypto/openssh/sshd_config 1.42.2.1.4.1 src/crypto/openssh/sshd_config.5 1.23.2.1.4.1 src/crypto/openssh/version.h 1.30.2.1.4.1 RELENG_6_0 src/UPDATING 1.416.2.3.2.20 src/sys/conf/newvers.sh 1.69.2.8.2.16 src/crypto/openssh/auth.h 1.15.2.1.2.1 src/crypto/openssh/deattack.c 1.1.1.7.10.1 src/crypto/openssh/deattack.h 1.1.1.3.16.1 src/crypto/openssh/defines.h 1.1.1.9.2.1.2.1 src/crypto/openssh/log.c 1.1.1.13.4.1 src/crypto/openssh/log.h 1.6.4.1 src/crypto/openssh/packet.c 1.1.1.16.2.1.2.1 src/crypto/openssh/session.c 1.46.2.1.2.1 src/crypto/openssh/ssh_config 1.27.2.1.2.1 src/crypto/openssh/ssh_config.5 1.17.2.1.2.1 src/crypto/openssh/sshd.c 1.39.2.1.2.1 src/crypto/openssh/sshd_config 1.42.2.1.2.1 src/crypto/openssh/sshd_config.5 1.23.2.1.2.1 src/crypto/openssh/version.h 1.30.2.1.2.1 - ------------------------------------------------------------------------- VII. References http://www.openssh.com/txt/release-4.4 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051 The latest revision of this advisory is available at http://security.FreeBSD.org/advisories/FreeBSD-SA-06:22.openssh.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (FreeBSD) iD8DBQFFHtD+FdaIBMps37IRAhw8AJ0dNrOCiYVEmqQqePByx/KUrdi+AACeNcB0 T5VfZGGXDv31Py3yxejjhlw=f1ch -----END PGP SIGNATURE-----
FreeBSD Security Advisories
2006-Sep-30 13:24 UTC
FreeBSD Security Advisory FreeBSD-SA-06:22.openssh
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================FreeBSD-SA-06:22.openssh Security Advisory The FreeBSD Project Topic: Multiple vulnerabilities in OpenSSH Category: contrib Module: openssh Announced: 2006-09-30 Credits: Tavis Ormandy, Mark Dowd Affects: All FreeBSD releases. Corrected: 2006-09-30 19:50:57 UTC (RELENG_6, 6.2-PRERELEASE) 2006-09-30 19:51:56 UTC (RELENG_6_1, 6.1-RELEASE-p10) 2006-09-30 19:53:21 UTC (RELENG_6_0, 6.0-RELEASE-p15) 2006-09-30 19:54:03 UTC (RELENG_5, 5.5-STABLE) 2006-09-30 19:54:58 UTC (RELENG_5_5, 5.5-RELEASE-p8) 2006-09-30 19:55:52 UTC (RELENG_5_4, 5.4-RELEASE-p22) 2006-09-30 19:56:38 UTC (RELENG_5_3, 5.3-RELEASE-p37) 2006-09-30 19:57:15 UTC (RELENG_4, 4.11-STABLE) 2006-09-30 19:58:07 UTC (RELENG_4_11, 4.11-RELEASE-p25) CVE Name: CVE-2006-4924, CVE-2006-5051 For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit <URL:http://security.FreeBSD.org/>. I. Background OpenSSH is an implementation of the SSH protocol suite, providing an encrypted, authenticated transport for a variety of services, including remote shell access. II. Problem Description The CRC compensation attack detector in the sshd(8) daemon, upon receipt of duplicate blocks, uses CPU time cubic in the number of duplicate blocks received. [CVE-2006-4924] A race condition exists in a signal handler used by the sshd(8) daemon to handle the LoginGraceTime option, which can potentially cause some cleanup routines to be executed multiple times. [CVE-2006-5051] III. Impact An attacker sending specially crafted packets to sshd(8) can cause a Denial of Service by using 100% of CPU time until a connection timeout occurs. Since this attack can be performed over multiple connections simultaneously, it is possible to cause up to MaxStartups (10 by default) sshd processes to use all the CPU time they can obtain. [CVE-2006-4924] The OpenSSH project believe that the race condition can lead to a Denial of Service or potentially remote code execution, but the FreeBSD Security Team has been unable to verify the exact impact. [CVE-2006-5051] IV. Workaround The attack against the CRC compensation attack detector can be avoided by disabling SSH Protocol version 1 support in sshd_config(5). There is no workaround for the second issue. V. Solution Perform one of the following: 1) Upgrade your vulnerable system to 4-STABLE, 5-STABLE, or 6-STABLE, or to the RELENG_6_1, RELENG_6_0, RELENG_5_5, RELENG_5_4, RELENG_5_3, or RELENG_4_11 security branch dated after the correction date. 2) To patch your present system: The following patches have been verified to apply to FreeBSD 4.11, 5.3, 5.4, 5.5, 6.0, and 6.1 systems. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. [FreeBSD 4.11] # fetch http://security.FreeBSD.org/patches/SA-06:22/openssh4x.patch # fetch http://security.FreeBSD.org/patches/SA-06:22/openssh4x.patch.asc [FreeBSD 5.x] # fetch http://security.FreeBSD.org/patches/SA-06:22/openssh5x.patch # fetch http://security.FreeBSD.org/patches/SA-06:22/openssh5x.patch.asc [FreeBSD 6.x] # fetch http://security.FreeBSD.org/patches/SA-06:22/openssh6x.patch # fetch http://security.FreeBSD.org/patches/SA-06:22/openssh6x.patch.asc b) Execute the following commands as root: # cd /usr/src # patch < /path/to/patch # cd /usr/src/secure/lib/libssh # make obj && make depend && make && make install # cd /usr/src/secure/usr.sbin/sshd # make obj && make depend && make && make install c) Restart the SSH daemon. On FreeBSD 5.x and 6.x, this can be done via # /etc/rc.d/sshd restart VI. Correction details The following list contains the revision numbers of each file that was corrected in FreeBSD. Branch Revision Path - ------------------------------------------------------------------------- RELENG_4 src/crypto/openssh/deattack.c 1.1.1.1.2.6 src/crypto/openssh/deattack.h 1.1.1.1.2.3 src/crypto/openssh/defines.h 1.1.1.2.2.3 src/crypto/openssh/log.c 1.1.1.1.2.6 src/crypto/openssh/log.h 1.1.1.1.2.4 src/crypto/openssh/packet.c 1.1.1.1.2.7 src/crypto/openssh/ssh_config 1.2.2.10 src/crypto/openssh/ssh_config.5 1.4.2.6 src/crypto/openssh/sshd.c 1.6.2.12 src/crypto/openssh/sshd_config 1.4.2.14 src/crypto/openssh/sshd_config.5 1.5.2.8 src/crypto/openssh/version.h 1.1.1.1.2.14 RELENG_4_11 src/UPDATING 1.73.2.91.2.26 src/sys/conf/newvers.sh 1.44.2.39.2.29 src/crypto/openssh/deattack.c 1.1.1.1.2.5.6.1 src/crypto/openssh/deattack.h 1.1.1.1.2.2.10.1 src/crypto/openssh/defines.h 1.1.1.2.2.2.8.1 src/crypto/openssh/log.c 1.1.1.1.2.5.8.1 src/crypto/openssh/log.h 1.1.1.1.2.3.8.1 src/crypto/openssh/packet.c 1.1.1.1.2.6.8.1 src/crypto/openssh/ssh_config 1.2.2.9.6.1 src/crypto/openssh/ssh_config.5 1.4.2.5.6.1 src/crypto/openssh/sshd.c 1.6.2.11.8.1 src/crypto/openssh/sshd_config 1.4.2.13.6.1 src/crypto/openssh/sshd_config.5 1.5.2.7.4.1 src/crypto/openssh/version.h 1.1.1.1.2.13.6.1 RELENG_5 src/crypto/openssh/auth.h 1.13.2.1 src/crypto/openssh/deattack.c 1.1.1.7.2.1 src/crypto/openssh/deattack.h 1.1.1.3.8.1 src/crypto/openssh/defines.h 1.1.1.7.2.1 src/crypto/openssh/log.c 1.1.1.10.2.1 src/crypto/openssh/log.h 1.5.2.1 src/crypto/openssh/packet.c 1.1.1.14.2.1 src/crypto/openssh/session.c 1.44.2.1 src/crypto/openssh/ssh_config 1.25.2.2 src/crypto/openssh/ssh_config.5 1.15.2.2 src/crypto/openssh/sshd.c 1.37.2.1 src/crypto/openssh/sshd_config 1.40.2.2 src/crypto/openssh/sshd_config.5 1.21.2.2 src/crypto/openssh/version.h 1.27.2.2 RELENG_5_5 src/UPDATING 1.342.2.35.2.8 src/sys/conf/newvers.sh 1.62.2.21.2.10 src/crypto/openssh/auth.h 1.13.8.1 src/crypto/openssh/deattack.c 1.1.1.7.14.1 src/crypto/openssh/deattack.h 1.1.1.3.20.1 src/crypto/openssh/defines.h 1.1.1.7.8.1 src/crypto/openssh/log.c 1.1.1.10.8.1 src/crypto/openssh/log.h 1.5.8.1 src/crypto/openssh/packet.c 1.1.1.14.8.1 src/crypto/openssh/session.c 1.44.8.1 src/crypto/openssh/ssh_config 1.25.2.1.2.1 src/crypto/openssh/ssh_config.5 1.15.2.1.2.1 src/crypto/openssh/sshd.c 1.37.8.1 src/crypto/openssh/sshd_config 1.40.2.1.2.1 src/crypto/openssh/sshd_config.5 1.21.2.1.2.1 src/crypto/openssh/version.h 1.27.2.1.2.1 RELENG_5_4 src/UPDATING 1.342.2.24.2.31 src/sys/conf/newvers.sh 1.62.2.18.2.27 src/crypto/openssh/auth.h 1.13.6.1 src/crypto/openssh/deattack.c 1.1.1.7.6.1 src/crypto/openssh/deattack.h 1.1.1.3.12.1 src/crypto/openssh/defines.h 1.1.1.7.6.1 src/crypto/openssh/log.c 1.1.1.10.6.1 src/crypto/openssh/log.h 1.5.6.1 src/crypto/openssh/packet.c 1.1.1.14.6.1 src/crypto/openssh/session.c 1.44.6.1 src/crypto/openssh/ssh_config 1.25.6.2 src/crypto/openssh/ssh_config.5 1.15.6.2 src/crypto/openssh/sshd.c 1.37.6.1 src/crypto/openssh/sshd_config 1.40.6.2 src/crypto/openssh/sshd_config.5 1.21.6.2 src/crypto/openssh/version.h 1.27.6.2 RELENG_5_3 src/UPDATING 1.342.2.13.2.40 src/sys/conf/newvers.sh 1.62.2.15.2.42 src/crypto/openssh/auth.h 1.13.4.1 src/crypto/openssh/deattack.c 1.1.1.7.4.1 src/crypto/openssh/deattack.h 1.1.1.3.10.1 src/crypto/openssh/defines.h 1.1.1.7.4.1 src/crypto/openssh/log.c 1.1.1.10.4.1 src/crypto/openssh/log.h 1.5.4.1 src/crypto/openssh/packet.c 1.1.1.14.4.1 src/crypto/openssh/session.c 1.44.4.1 src/crypto/openssh/ssh_config 1.25.4.2 src/crypto/openssh/ssh_config.5 1.15.4.2 src/crypto/openssh/sshd.c 1.37.4.1 src/crypto/openssh/sshd_config 1.40.4.2 src/crypto/openssh/sshd_config.5 1.21.4.2 src/crypto/openssh/version.h 1.27.4.2 RELENG_6 src/crypto/openssh/auth.h 1.15.2.2 src/crypto/openssh/deattack.c 1.1.1.7.8.1 src/crypto/openssh/deattack.h 1.1.1.3.14.1 src/crypto/openssh/defines.h 1.1.1.9.2.2 src/crypto/openssh/log.c 1.1.1.13.2.1 src/crypto/openssh/log.h 1.6.2.1 src/crypto/openssh/packet.c 1.1.1.16.2.2 src/crypto/openssh/session.c 1.46.2.2 src/crypto/openssh/ssh_config 1.27.2.2 src/crypto/openssh/ssh_config.5 1.17.2.2 src/crypto/openssh/sshd.c 1.39.2.2 src/crypto/openssh/sshd_config 1.42.2.2 src/crypto/openssh/sshd_config.5 1.23.2.2 src/crypto/openssh/version.h 1.30.2.2 RELENG_6_1 src/UPDATING 1.416.2.22.2.12 src/sys/conf/newvers.sh 1.69.2.11.2.12 src/crypto/openssh/auth.h 1.15.2.1.4.1 src/crypto/openssh/deattack.c 1.1.1.7.12.1 src/crypto/openssh/deattack.h 1.1.1.3.18.1 src/crypto/openssh/defines.h 1.1.1.9.2.1.4.1 src/crypto/openssh/log.c 1.1.1.13.6.1 src/crypto/openssh/log.h 1.6.6.1 src/crypto/openssh/packet.c 1.1.1.16.2.1.4.1 src/crypto/openssh/session.c 1.46.2.1.4.1 src/crypto/openssh/ssh_config 1.27.2.1.4.1 src/crypto/openssh/ssh_config.5 1.17.2.1.4.1 src/crypto/openssh/sshd.c 1.39.2.1.4.1 src/crypto/openssh/sshd_config 1.42.2.1.4.1 src/crypto/openssh/sshd_config.5 1.23.2.1.4.1 src/crypto/openssh/version.h 1.30.2.1.4.1 RELENG_6_0 src/UPDATING 1.416.2.3.2.20 src/sys/conf/newvers.sh 1.69.2.8.2.16 src/crypto/openssh/auth.h 1.15.2.1.2.1 src/crypto/openssh/deattack.c 1.1.1.7.10.1 src/crypto/openssh/deattack.h 1.1.1.3.16.1 src/crypto/openssh/defines.h 1.1.1.9.2.1.2.1 src/crypto/openssh/log.c 1.1.1.13.4.1 src/crypto/openssh/log.h 1.6.4.1 src/crypto/openssh/packet.c 1.1.1.16.2.1.2.1 src/crypto/openssh/session.c 1.46.2.1.2.1 src/crypto/openssh/ssh_config 1.27.2.1.2.1 src/crypto/openssh/ssh_config.5 1.17.2.1.2.1 src/crypto/openssh/sshd.c 1.39.2.1.2.1 src/crypto/openssh/sshd_config 1.42.2.1.2.1 src/crypto/openssh/sshd_config.5 1.23.2.1.2.1 src/crypto/openssh/version.h 1.30.2.1.2.1 - ------------------------------------------------------------------------- VII. References http://www.openssh.com/txt/release-4.4 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051 The latest revision of this advisory is available at http://security.FreeBSD.org/advisories/FreeBSD-SA-06:22.openssh.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (FreeBSD) iD8DBQFFHtD+FdaIBMps37IRAhw8AJ0dNrOCiYVEmqQqePByx/KUrdi+AACeNcB0 T5VfZGGXDv31Py3yxejjhlw=f1ch -----END PGP SIGNATURE-----
Pekka Savola
2006-Sep-30 18:13 UTC
[FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-06:22.openssh
On Sat, 30 Sep 2006, FreeBSD Security Advisories wrote:> III. Impact > > An attacker sending specially crafted packets to sshd(8) can cause a > Denial of Service by using 100% of CPU time until a connection timeout > occurs. Since this attack can be performed over multiple connections > simultaneously, it is possible to cause up to MaxStartups (10 by default) > sshd processes to use all the CPU time they can obtain. [CVE-2006-4924] > > The OpenSSH project believe that the race condition can lead to a Denial > of Service or potentially remote code execution, but the FreeBSD Security > Team has been unable to verify the exact impact. [CVE-2006-5051] > > IV. Workaround > > The attack against the CRC compensation attack detector can be avoided > by disabling SSH Protocol version 1 support in sshd_config(5). > > There is no workaround for the second issue.Doesn't TCP wrappers restriction mitigate or work around this issue or is it done too late ? -- Pekka Savola "You each name yourselves king, yet the Netcore Oy kingdom bleeds." Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
Mark Peek
2006-Oct-01 16:23 UTC
[FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-06:22.openssh
On 9/30/06 1:24 PM, FreeBSD Security Advisories wrote:> -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > ============================================================================> FreeBSD-SA-06:22.openssh Security Advisory > The FreeBSD Project > > Topic: Multiple vulnerabilities in OpenSSH > > Category: contrib > Module: openssh > Announced: 2006-09-30 > Credits: Tavis Ormandy, Mark Dowd > Affects: All FreeBSD releases. > Corrected: 2006-09-30 19:50:57 UTC (RELENG_6, 6.2-PRERELEASE) > 2006-09-30 19:51:56 UTC (RELENG_6_1, 6.1-RELEASE-p10) > 2006-09-30 19:53:21 UTC (RELENG_6_0, 6.0-RELEASE-p15) > 2006-09-30 19:54:03 UTC (RELENG_5, 5.5-STABLE) > 2006-09-30 19:54:58 UTC (RELENG_5_5, 5.5-RELEASE-p8) > 2006-09-30 19:55:52 UTC (RELENG_5_4, 5.4-RELEASE-p22) > 2006-09-30 19:56:38 UTC (RELENG_5_3, 5.3-RELEASE-p37) > 2006-09-30 19:57:15 UTC (RELENG_4, 4.11-STABLE) > 2006-09-30 19:58:07 UTC (RELENG_4_11, 4.11-RELEASE-p25) > CVE Name: CVE-2006-4924, CVE-2006-5051 > > For general information regarding FreeBSD Security Advisories, > including descriptions of the fields above, security branches, and the > following sections, please visit <URL:http://security.FreeBSD.org/>. > > I. Background > > OpenSSH is an implementation of the SSH protocol suite, providing an > encrypted, authenticated transport for a variety of services, > including remote shell access.>snip< BTW, the patches for this advisory appear to also need a patch to add log.c into src/secure/usr.sbin/sshd/Makefile. Mark
Simon L. Nielsen
2006-Oct-02 12:11 UTC
[FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-06:22.openssh
On 2006.10.01 00:07:02 +0300, Pekka Savola wrote:> On Sat, 30 Sep 2006, FreeBSD Security Advisories wrote: > >III. Impact > > > >An attacker sending specially crafted packets to sshd(8) can cause a > >Denial of Service by using 100% of CPU time until a connection timeout > >occurs. Since this attack can be performed over multiple connections > >simultaneously, it is possible to cause up to MaxStartups (10 by default) > >sshd processes to use all the CPU time they can obtain. [CVE-2006-4924] > > > >The OpenSSH project believe that the race condition can lead to a Denial > >of Service or potentially remote code execution, but the FreeBSD Security > >Team has been unable to verify the exact impact. [CVE-2006-5051] > > > >IV. Workaround > > > >The attack against the CRC compensation attack detector can be avoided > >by disabling SSH Protocol version 1 support in sshd_config(5). > > > >There is no workaround for the second issue. > > Doesn't TCP wrappers restriction mitigate or work around this issue or > is it done too late ?I'm not sure since I have never really used TCP wrappers, but I would expect it to work. I generally use firewalls to restrict which IP addresses are allowed to access services when possible. -- Simon L. Nielsen
Simon L. Nielsen
2006-Oct-02 12:13 UTC
[FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-06:22.openssh
On 2006.10.01 15:10:50 -0700, Mark Peek wrote:> >Topic: Multiple vulnerabilities in OpenSSH > > BTW, the patches for this advisory appear to also need a patch to add log.c > into src/secure/usr.sbin/sshd/Makefile.Eh, why? log.c is built by libssh. -- Simon L. Nielsen
> The OpenSSH project believe that the race condition can lead to a Denial > of Service or potentially remote code execution^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Bullshit. Where did anyone say this? Why don't you put people in charge who can READ CODE, and SEE THAT THIS IS ABSOLUTE BULLSHIT.
Theo de Raadt wrote:>> The OpenSSH project believe that the race condition can lead to a Denial >> of Service or potentially remote code execution > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > Bullshit. Where did anyone say this?The OpenSSH 4.4 release announcement says that, actually: * Fix an unsafe signal hander reported by Mark Dowd. The signal handler was vulnerable to a race condition that could be exploited to perform a pre-authentication denial of service. On portable OpenSSH, this vulnerability could theoretically lead to ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ pre-authentication remote code execution if GSSAPI authentication ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ is enabled, but the likelihood of successful exploitation appears remote. Colin Percival
Mark Peek
2006-Oct-02 18:21 UTC
[FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-06:22.openssh
On 10/2/06 12:12 PM, Simon L. Nielsen wrote:> On 2006.10.01 15:10:50 -0700, Mark Peek wrote: >>> Topic: Multiple vulnerabilities in OpenSSH >> BTW, the patches for this advisory appear to also need a patch to add log.c >> into src/secure/usr.sbin/sshd/Makefile. > > Eh, why? log.c is built by libssh.Mea culpa! You are right, it was a problem with the way I was rebuilding it. Sorry for the noise on the list, I was erring on pinging you first since I thought it was a real issue. Mark
On Mon, Oct 02, 2006 at 02:25:05PM -0700, Colin Percival wrote:> Theo de Raadt wrote: > >> The OpenSSH project believe that the race condition can lead to a Denial > >> of Service or potentially remote code execution > > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > > Bullshit. Where did anyone say this? > > The OpenSSH 4.4 release announcement says that, actually: > > * Fix an unsafe signal hander reported by Mark Dowd. The signal > handler was vulnerable to a race condition that could be exploited > to perform a pre-authentication denial of service. On portable > OpenSSH, this vulnerability could theoretically lead to > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > pre-authentication remote code execution if GSSAPI authentication > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > is enabled, but the likelihood of successful exploitation appears > remote.Theo: Maybe you should put people in charge who can read their own release announcements before flaming a mailing list.
Maybe Matching Threads
- FreeBSD Security Advisory FreeBSD-SA-06:22.openssh
- FreeBSD Security Advisory FreeBSD-SA-06:22.openssh
- FreeBSD Security Advisory FreeBSD-SA-03:12.openssh [REVISED]
- FreeBSD Security Advisory FreeBSD-SA-03:12.openssh [REVISED]
- FreeBSD Security Advisory FreeBSD-SA-06:23.openssl