Mandrake Linux Security Advisory : openssh (MDKSA-2001:033-2)

This script is Copyright (C) 2004-2013 Tenable Network Security, Inc.

Synopsis :

The remote Mandrake Linux host is missing one or more security

Description :

There are several weaknesses in various implementations of the SSH
(Secure Shell) protocols. When exploited, they let the attacker obtain
sensitive information by passively monitoring encrypted SSH sessions.
The information can later be used to speed up brute-force attacks on
passwords, including the initial login password and other passwords
appearing in interactive SSH sessions, such as those used with su.
Versions of OpenSSH 2.5.2 and later have been fixed to reduce the
impact of these traffic analysis problems, and as such all Linux-
Mandrake users are encouraged to upgrade their version of openssh

Update :

A problem was introduced with a patch applied to the OpenSSH packages
released in the previous update. This problem was due to the keepalive
patch included, and it broke interoperability with older versions of
OpenSSH and SSH. This update removes the patch, and also provides the
latest version of OpenSSH which provides a number of new features and

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5

Family: Mandriva Local Security Checks

Nessus Plugin ID: 14776 (mandrake_MDKSA-2001-033.nasl)

Bugtraq ID:

CVE ID: CVE-2001-0572

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now