SuSE 11.3 Security Update : openssh (SAT Patch Number 9357)

This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

This update for OpenSSH fixes the following issues :

- Exit sshd normally when port is already in use.
(bnc#832628)

- Use hardware crypto engines where available.
(bnc#826427)

- Use correct options for login when it is used.
(bnc#833605)

- Move FIPS messages to higher debug level. (bnc#862875)

- Fix forwarding with IPv6 addresses in DISPLAY.
(bnc#847710)

- Do not link OpenSSH binaries with LDAP libraries.
(bnc#826906)

- Parse AcceptEnv properly. (bnc#869101, CVE-2014-2532)

- Check SSHFP DNS records even for server certificates.
(bnc#870532, CVE-2014-2653)

See also :

https://bugzilla.novell.com/show_bug.cgi?id=826427
https://bugzilla.novell.com/show_bug.cgi?id=833605
https://bugzilla.novell.com/show_bug.cgi?id=847710
https://bugzilla.novell.com/show_bug.cgi?id=869101
https://bugzilla.novell.com/show_bug.cgi?id=870532
http://support.novell.com/security/cve/CVE-2014-2532.html
http://support.novell.com/security/cve/CVE-2014-2653.html

Solution :

Apply SAT patch number 9357.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)

Family: SuSE Local Security Checks

Nessus Plugin ID: 76140 ()

Bugtraq ID:

CVE ID: CVE-2014-2532
CVE-2014-2653

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now