openSUSE Security Update : openssh (openSUSE-2016-1096)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update for openssh fixes the following issues :

- Prevent user enumeration through the timing of password
processing (bsc#989363, CVE-2016-6210)

- Allow lowering the DH groups parameter limit in server
as well as when GSSAPI key exchange is used (bsc#948902)

- limit accepted password length (prevents possible DoS)
(bsc#992533, CVE-2016-6515)

Bug fixes :

- avoid complaining about unset DISPLAY variable
(bsc#981654)

This update was imported from the SUSE:SLE-12:Update update project.

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=948902
https://bugzilla.opensuse.org/show_bug.cgi?id=981654
https://bugzilla.opensuse.org/show_bug.cgi?id=989363
https://bugzilla.opensuse.org/show_bug.cgi?id=992533

Solution :

Update the affected openssh packages.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 93598 ()

Bugtraq ID:

CVE ID: CVE-2016-6210
CVE-2016-6515

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now