Debian Security: ssh channel bug

From:   Michael Stone <mstone@pandora.debian.org>
Subject:        [SECURITY] [DSA 119-1] ssh channel bug
Date:   08 Mar 2002 21:35:16 +0100      
Package: openssh
Vulnerability: local root exploit, remote client exploit
Debian-specific: no
Joost Pol <joost@pine.nl> reports that OpenSSH versions 2.0 through 3.0.2
have an off-by-one bug in the channel allocation code. This vulnerability
can be exploited by authenticated users to gain root privilege or by a
malicious server exploiting a client with this bug.
Since Debian 2.2 (potato) shipped with OpenSSH (the "ssh" package)
version 1.2.3, it is not vulnerable to this exploit. No fix is required
for Debian 2.2 (potato).
The Debian unstable and testing archives do include a more recent OpenSSH
(ssh) package. If you are running these pre-release distributions you
should ensure that you are running version 3.0.2p1-8, a patched version
which was added to the unstable archive today, or a later version.
- ----------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis