SynopsisThe remote AIX host has a vulnerable version of OpenSSH.
DescriptionThe version of OpenSSH running on the remote host is affected by a security bypass vulnerability due to a failure to check the refusal deadline during the forwarding of untrusted X11 connections. A remote attacker can exploit this to bypass timeout checks and XSECURITY restrictions.
SolutionA fix is available and can be downloaded from the AIX website.
To extract the fixes from the tar file :
zcat OpenSSH_220.127.116.1110.tar.Z | tar xvf - (or) zcat OpenSSH_18.104.22.16801.tar.Z | tar xvf -
IMPORTANT : If possible, it is recommended that an mksysb backup of the system be created. Verify it is both bootable and readable before proceeding.
To preview the fix installation :
installp -apYd . OpenSSH_22.214.171.12410 (or) installp -apYd . OpenSSH_126.96.36.19901
To install the fix package:
installp -aXYd . OpenSSH_188.8.131.5210 (or) installp -aXYd . OpenSSH_184.108.40.20601