OpenSSH < 3.4 Multiple Remote Overflows
High Nessus Network Monitor Plugin ID 1987
SynopsisThe remote host is vulnerable to a buffer overflow.
DescriptionThe remote host is running a version of OpenSSH which is older than 3.4. There is a flaw in this version that can be exploited remotely to give an attacker a shell on this host. Note that several distributions patched this hole without changing the version number of OpenSSH.
If you are running a RedHat host, make sure that the command :
rpm -q openssh-server
Returns : openssh-server-3.1p1-6.
Note: PVS has solely relied on the banner of the SSH client to perform this check. Any backported patches or workarounds such as recompiling or edited configurations are not observable through the banner.
SolutionUpgrade to OpenSSH 3.4 or contact your vendor for a patch.