what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

SCOSA-2008.2.txt

SCOSA-2008.2.txt
Posted Mar 13, 2008
Authored by SCO | Site sco.com

SCO Security Advisory SCOSA-2008.2 - sshd in OpenSSH versions before 4.4, when using the version 1 SSH protocol, could allow a remote attacker to cause a denial of service. It certainly is nice to have SCO bring this to light for their consumers two years after the fact.

tags | advisory, remote, denial of service, protocol
advisories | CVE-2006-4924
SHA-256 | 7b85b6b25922a9638680df7e8c6550ec8639cf624979b1d840ed176611234312

SCOSA-2008.2.txt

Change Mirror Download
          SCO Security Advisory


Subject: OpenSSH Denial Of Service Vulnerability
Advisory number: SCOSA-2008.2
Issue date: 12th March 2008
Cross reference: fz534336, fz533530
CVE-2006-4924
______________________________________________________________________________


1. Problem Description

sshd in OpenSSH versions before 4.4, when using the version 1 SSH
protocol, could allow a remote attacker to cause a denial of service
(CPU consumption) via an SSH packet that contains duplicate blocks,
which is not properly handled by the CRC compensation attack detector.

2. Vulnerable Supported Versions

System Package
----------------------------------------------------------------------
UnixWare 7.1.4 openssh 4.2p1
UnixWare 7.1.3 openssh 4.0p1

3. Solution

The proper solution is to install the relevant package below.

4. UnixWare 7.1.4

This patch should only be installed on UnixWare 7.1.4 systems with
Maintenance Pack 3 (MP3) applied. You can download MP3 from:

ftp://ftp.sco.com/pub/unixware7/714/mp/uw714mp3

4.1 Location of Fixed Binaries

ftp://ftp.sco.com/pub/unixware7/714/security/p534336/

4.2 Verification

MD5 (p534336.image) = 89271cc36a93ab8252159a4a98abc221

md5 is available for download from

ftp://ftp.sco.com/pub/security/tools

4.3 Installation Instructions

1) Download the p534336.image file to the /tmp directory on
your machine.

2) As root, add the package to your system using these commands:

$ su -
Password: <type your root password>
# pkgadd -d /tmp/p534336.image

Alternatively, this package may be installed in quiet mode,
that is, without displaying the release notes and asking for
confirmation. To do this, use these commands:

$ su -
Password: <type your root password>
# pkgadd -qd /tmp/p534589.image all

3) There is no need to reboot the system after installing this
package.

4.4 Removal Instructions

1) As root, remove the package using these commands:

$ su -
Password: <type your root password>
# pkgrm p534589

5. UnixWare 7.1.3

This patch should only be installed on UnixWare 7.1.3 systems with
Maintenance Pack 5 (MP5) applied. You can download MP5 from:

ftp://ftp.sco.com/pub/unixware7/713/mp/mp5

5.1 Location of Fixed Binaries

ftp://ftp.sco.com/pub/unixware7/713/security/p534336_713/

5.2 Verification

MD5 (p534336.image) = 1554e72a7197480d77687ef0246964c1

md5 is available for download from

ftp://ftp.sco.com/pub/security/tools

5.3 Installation Instructions

1) Download the p534336.image file to the /tmp directory on
your machine.

2) As root, add the package to your system using these commands:

$ su -
Password: <type your root password>
# pkgadd -d /tmp/p534336.image

Alternatively, this package may be installed in quiet mode,
that is, without displaying the release notes and asking for
confirmation. To do this, use these commands:

$ su -
Password: <type your root password>
# pkgadd -qd /tmp/p534589.image all

3) There is no need to reboot the system after installing this
package.

5.4 Removal Instructions

1) As root, remove the package using these commands:

$ su -
Password: <type your root password>
# pkgrm p534589

6. References

SCO security resources:
http://www.sco.com/support/download.html

SCO security advisories via email
http://www.sco.com/support/forums/security.html

This security fix closes SCO incidents fz534336 and 533530.

7. Disclaimers

SCO is not responsible for the misuse of any of the information
we provide on this website and/or through our security
advisories. Our advisories are a service to our customers intended
to promote secure installation and use of SCO products.

8. Acknowledgements

N/A

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close