GLSA-200611-06 : OpenSSH: Multiple Denial of Service vulnerabilities

High Nessus Plugin ID 23671

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-200611-06 (OpenSSH: Multiple Denial of Service vulnerabilities)

Tavis Ormandy of the Google Security Team has discovered a pre-authentication vulnerability, causing sshd to spin until the login grace time has been expired. Mark Dowd found an unsafe signal handler that was vulnerable to a race condition. It has also been discovered that when GSSAPI authentication is enabled, GSSAPI will in certain cases incorrectly abort.
Impact :

The pre-authentication and signal handler vulnerabilities can cause a Denial of Service in OpenSSH. The vulnerability in the GSSAPI authentication abort could be used to determine the validity of usernames on some platforms.
Workaround :

There is no known workaround at this time.

Solution

All OpenSSH users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=net-misc/openssh-4.4_p1-r5'

See Also

http://www.openssh.com/txt/release-4.4

https://security.gentoo.org/glsa/200611-06

Plugin Details

Severity: High

ID: 23671

File Name: gentoo_GLSA-200611-06.nasl

Version: 1.16

Type: local

Published: 2006/11/20

Updated: 2019/08/02

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:openssh, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2006/11/13

Vulnerability Publication Date: 2006/09/28

Reference Information

CVE: CVE-2006-5051, CVE-2006-5052

BID: 20241, 20245

GLSA: 200611-06

CWE: 362