OpenSSH < 3.1 Channel Code Off by One Privilege Escalation
High Nessus Network Monitor Plugin ID 1990
SynopsisThe remote host is vulnerable to a buffer overflow.
DescriptionThe remote host is running a version of OpenSSH which is older than 3.1. Versions prior than 3.1 are vulnerable to an off by one error that allows local users to gain root access, and it may be possible for remote users to similarly compromise the daemon for remote access. In addition, a vulnerable SSH client may be compromised by connecting to a malicious SSH daemon that exploits this vulnerability in the client code, thus compromising the client system.
Note: PVS has solely relied on the banner of the SSH client to perform this check. Any backported patches or workarounds such as recompiling or edited configurations are not observable through the banner.
SolutionUpgrade to OpenSSH 3.1 or higher.