Red Hat Security Advisory: opensshMar 28, 2001, 20:23 (3 Talkback[s])
Date: Tue, 27 Mar 2001 15:24:00 -0500
Red Hat, Inc. Red Hat Security Advisory Synopsis: Updated openssh packages available Advisory ID: RHSA-2001:033-04 Issue date: 2001-03-23 Updated on: 2001-03-27 Product: Red Hat Linux Keywords: openssh passive analysis Cross references: Obsoletes: RHBA-2000-076 RHSA-2000-111
Updated openssh packages are now available for Red Hat Linux 7. These packages reduce the amount of information a passive attacker can deduce from observing an encrypted session.
2. Relevant releases/architectures:
Red Hat Linux 7.0 - alpha, i386
3. Problem description:
Weaknesses in the SSH protocols can be used by a passive attacker to deduce information about passwords entered over an encrypted connection. This information can be used to reduce the number of possible solutions which need to be tested to perform a brute-force attack. This reduces the amount of time and resources required to mount such an attack successfully.
OpenSSH 2.5.1 and 2.5.2 include modifications which, while not completely resolving this problem, reduce the risks by changing certain server behaviors to make passive analysis more difficult.
To update all RPMs for your particular architecture, run:
rpm -Fvh [filenames]
where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directly *only* contains the desired RPMs.
Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command:
This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
30293 - Where is sftp?
6. RPMs required:
Red Hat Linux 7.0:
MD5 sum Package Name
These packages are GPG signed by Red Hat, Inc. for security. Our
key is available at:
You can verify each package with the following command:
If you only wish to verify that each package has not been
corrupted or tampered with, examine only the md5sum with the
Copyright(c) 2000, 2001 Red Hat, Inc.