Debian DSA-1189-1 : openssh-krb5 - several vulnerabilities

high Nessus Plugin ID 22731

Synopsis

The remote Debian host is missing a security-related update.

Description

Several remote vulnerabilities have been discovered in OpenSSH, a free implementation of the Secure Shell protocol, which may lead to denial of service and potentially the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2006-4924 Tavis Ormandy of the Google Security Team discovered a denial of service vulnerability in the mitigation code against complexity attacks, which might lead to increased CPU consumption until a timeout is triggered.
This is only exploitable if support for SSH protocol version 1 is enabled.

- CVE-2006-5051 Mark Dowd discovered that insecure signal handler usage could potentially lead to execution of arbitrary code through a double free. The Debian Security Team doesn't believe the general openssh package without Kerberos support to be exploitable by this issue. However, due to the complexity of the underlying code we will issue an update to rule out all eventualities.

Solution

Upgrade the openssh-krb5 packages.

For the stable distribution (sarge) these problems have been fixed in version 3.8.1p1-7sarge1.

See Also

https://security-tracker.debian.org/tracker/CVE-2006-4924

https://security-tracker.debian.org/tracker/CVE-2006-5051

http://www.debian.org/security/2006/dsa-1189

Plugin Details

Severity: High

ID: 22731

File Name: debian_DSA-1189.nasl

Version: 1.19

Type: local

Agent: unix

Published: 10/14/2006

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:openssh-krb5, cpe:/o:debian:debian_linux:3.1

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 10/4/2006

Vulnerability Publication Date: 9/25/2006

Reference Information

CVE: CVE-2006-4924, CVE-2006-5051

CWE: 362, 399

DSA: 1189