GLSA-200611-06 : OpenSSH: Multiple Denial of Service vulnerabilities

high Nessus Plugin ID 23671

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-200611-06 (OpenSSH: Multiple Denial of Service vulnerabilities)

Tavis Ormandy of the Google Security Team has discovered a pre-authentication vulnerability, causing sshd to spin until the login grace time has been expired. Mark Dowd found an unsafe signal handler that was vulnerable to a race condition. It has also been discovered that when GSSAPI authentication is enabled, GSSAPI will in certain cases incorrectly abort.
Impact :

The pre-authentication and signal handler vulnerabilities can cause a Denial of Service in OpenSSH. The vulnerability in the GSSAPI authentication abort could be used to determine the validity of usernames on some platforms.
Workaround :

There is no known workaround at this time.

Solution

All OpenSSH users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=net-misc/openssh-4.4_p1-r5'

See Also

http://www.openssh.com/txt/release-4.4

https://security.gentoo.org/glsa/200611-06

Plugin Details

Severity: High

ID: 23671

File Name: gentoo_GLSA-200611-06.nasl

Version: 1.17

Type: local

Published: 11/20/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:openssh, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Ease: No known exploits are available

Patch Publication Date: 11/13/2006

Vulnerability Publication Date: 9/28/2006

Reference Information

CVE: CVE-2006-5051, CVE-2006-5052

BID: 20241, 20245

CWE: 362

GLSA: 200611-06