LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 06-18-2004, 09:58 PM   #1
Zoey_The_Cat
LQ Newbie
 
Registered: May 2004
Distribution: RedHat
Posts: 4

Rep: Reputation: 0
SSH Security Question


I was recently contacted, and told that I should update some stuff on the server, because it had security holes. I figured I'd confirm that here, and perhaps get some help doing so.

First off, I was told that:
Quote:
A buffer overflow in libbind and libc can be exploited by an attacker to gain remote access to any server that uses these vulnerable resolver implementations. BIND up to 9.2.1, Sendmail, and most versions of Unix are vulnerable, to name a few.

ISC BIND

CA-2002-19: Buffer Overflow in Multiple DNS Resolver Libraries
And then:

Quote:
Several versions of the OpenSSH sshd between 1.2.2 and 3.3 contain an input validation error that can result in an integer overflow and privilege escalation.


Upgrade to OpenSSH 3.4 or later.


OpenSSH versions prior to 3.7.1 are vulnerable to buffer management errors.
I'm slightly confused, but if anyone can confirm/shoot down these statements, please do so.

If I do need to upgrade SSH, how would I go about doing so? I've been Googling around and haven't found all that much helpful stuff.

It's running RedHat 7.2, and:

OpenSSH_3.1p1, SSH protocols 1.5/2.0, OpenSSL 0x0090602f.

Let me know if there's anything else you need to know.

Thanks in advance!
 
Old 06-19-2004, 01:58 AM   #2
chort
Senior Member
 
Registered: Jul 2003
Location: Silicon Valley, USA
Distribution: OpenBSD 4.6, OS X 10.6.2, CentOS 4 & 5
Posts: 3,660

Rep: Reputation: 76
Wow, I can't believe they didn't say anything about your OpenSSL version, because that's vulnerable as well. It looks like that software hasn't been touched since the original install!

Your OpenSSH should be 3.7.1p2 or later, your BIND should be 9.2.3, your OpenSSL should be 0.9.6m, or 0.9.7d. Probably all the other software you have running is vulnerable to something as well (for instance there have been several vulnerabilities in Apache and it's modules, particularly PHP (mod_php).

You can either download the source to all of these and compile the new versions yourself (www.openssh.org, www.isc.org, www.openssl.org, www.apache.org, etc) or you can look on RPMfind.net (or rpmfind.speakeasy.net) to see if there are updated packages for old versions of Red Hat (it's doubtful that they will be recent enough, but you can try).

One thing about Red Hat that is frustrating is that they backport patches without bumping the version number, so you never know by the version whether a problem is fixed or not (for instance Red Hat backported the patches from OpenSSH 3.7.1p2 back to 3.5.1, so it appears it's still vulnerable even after you upgrade it).
 
Old 06-19-2004, 02:16 AM   #3
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
ISC BIND, CA-2002-19
"CA" means "CERT Advisory": lookup format is www.cert.org/advisories/CA-YYYY-NR.html
This one is damn old and handles resolver buffer overflow situations in both DNS resolvers and Glibc. The way an exploit could work would be to for the attacker to ask for a process on your box to resolve an address for which a domain for she has taken control of the authoritative DNS so she can return a result that would exploit this condition. Note the advisory does not recognise running a caching nameserver as mitigation circumstances. IMHO the fact it usually isn't that easy to take over an authoritative DNS should not be seen as mitigating circumstances either.

Therefore you must immediately check if your RHL7.x box has a vulnerable version of Glibc, recompile any static apps that rely on Glibc's resolver and upgrade ISC BIND. The fact you're asking for confirmation on a two year old CERT Advisory isn't good. It means no one cared for upgrading the box, which makes it a liability for you, (the company you work for,) and everyone else. If you have no real reasons (businesswise) to stay with obsolete RHL, moving to RHEL, an RHEL clone, FC or any other current, supported vendor/distro combo would be advisable.


If I do need to upgrade SSH, how would I go about doing so? I've been Googling around and haven't found all that much helpful stuff.
Download OpenSSH from the main source. If you tar -t the tarball you'll notice it has a .spec file, which means "rpmbuild -ta <tarballname.extension>" should work. Before you do so, inspect the .spec file for SSL and Glibc version dependencies.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
SSH Security pembo13 Linux - Security 20 09-13-2004 09:03 PM
security on ssh spank Linux - Security 1 02-26-2004 02:22 PM
ssh security ashley75 Linux - General 7 09-19-2003 11:15 AM
Newbie and SSH Security KnightAzul Linux - Security 3 09-11-2003 06:37 PM
SSH Security 1jamie Linux - Security 2 09-08-2003 01:39 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 12:18 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration