openSUSE Security Update : dropbear (openSUSE-SU-2013:1616-1)

Medium Nessus Plugin ID 75182


The remote openSUSE host is missing a security update.


dropbear was updated to version 2013.60 to fix following bugs :

- Fix 'make install' so that it doesn't always install to /bin and /sbin

- Fix 'make install MULTI=1', installing manpages failed

- Fix 'make install' when scp is included since it has no manpage

- Make --disable-bundled-libtom work

- used as bug fix release for bnc#845306 - VUL-0:
CVE-2013-4421 and CVE-2013-4434

- provided links for download sources

- employed gpg-offline - verify sources

- imported upstream version 2013.59

- Fix crash from -J command Thanks to Lluís Batlle i Rossell and Arnaud Mouiche for patches

- Avoid reading too much from /proc/net/rt_cache since that causes system slowness.

- Improve EOF handling for half-closed connections Thanks to Catalin Patulea

- Send a banner message to report PAM error messages intended for the user Patch from Martin Donnelly

- Limit the size of decompressed payloads, avoids memory exhaustion denial of service Thanks to Logan Lamb for reporting and investigating it

- Avoid disclosing existence of valid users through inconsistent delays Thanks to Logan Lamb for reporting

- Update config.guess and config.sub for newer architectures

- Avoid segfault in server for locked accounts

- 'make install' now installs manpages dropbearkey.8 has been renamed to dropbearkey.1 manpage added for dropbearconvert

- Get rid of one second delay when running non-interactive commands


Update the affected dropbear packages.

See Also

Plugin Details

Severity: Medium

ID: 75182

File Name: openSUSE-2013-811.nasl

Version: $Revision: 1.1 $

Type: local

Agent: unix

Published: 2014/06/13

Modified: 2014/06/13

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:dropbear, p-cpe:/a:novell:opensuse:dropbear-debuginfo, p-cpe:/a:novell:opensuse:dropbear-debugsource, cpe:/o:novell:opensuse:12.3

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2013/10/22

Reference Information

CVE: CVE-2013-4421, CVE-2013-4434

BID: 62958, 62993

OSVDB: 98303, 98365