Oracle Linux 6 : openssh (ELSA-2017-2563)

Medium Nessus Plugin ID 102904

Synopsis

The remote Oracle Linux host is missing one or more security updates.

Description

From Red Hat Security Advisory 2017:2563 :

An update for openssh is now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.

Security Fix(es) :

* A covert timing channel flaw was found in the way OpenSSH handled authentication of non-existent users. A remote unauthenticated attacker could possibly use this flaw to determine valid user names by measuring the timing of server responses. (CVE-2016-6210)

Solution

Update the affected openssh packages.

See Also

https://oss.oracle.com/pipermail/el-errata/2017-August/007169.html

Plugin Details

Severity: Medium

ID: 102904

File Name: oraclelinux_ELSA-2017-2563.nasl

Version: 3.5

Type: local

Agent: unix

Published: 2017/09/01

Updated: 2019/09/27

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

CVSS v3.0

Base Score: 5.9

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:openssh, p-cpe:/a:oracle:linux:openssh-askpass, p-cpe:/a:oracle:linux:openssh-clients, p-cpe:/a:oracle:linux:openssh-ldap, p-cpe:/a:oracle:linux:openssh-server, p-cpe:/a:oracle:linux:pam_ssh_agent_auth, cpe:/o:oracle:linux:6

Required KB Items: Host/local_checks_enabled, Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2017/08/31

Vulnerability Publication Date: 2017/02/13

Reference Information

CVE: CVE-2016-6210

RHSA: 2017:2563