---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. Request your account, the Secunia Network Software Inspector (NSI): http://secunia.com/network_software_inspector/ ---------------------------------------------------------------------- TITLE: Fedora update for openssh SECUNIA ADVISORY ID: SA27235 VERIFY ADVISORY: http://secunia.com/advisories/27235/ CRITICAL: Not critical IMPACT: Manipulation of data WHERE: >From remote OPERATING SYSTEM: Fedora Core 6 http://secunia.com/product/12487/ DESCRIPTION: Fedora has issued an update for openssh. This fixes a vulnerability, which can be exploited by malicious people to inject certain data. The vulnerability is caused due to an error within the "linux_audit_record_event()" function and can be exploited to inject invalid character sequences into log entries via a specially crafted username. SOLUTION: Apply updated packages. c4bbdf05c3ec42791b33aed51106634c5ab4ea96 SRPMS/openssh-4.3p2-25.fc6.src.rpm c4bbdf05c3ec42791b33aed51106634c5ab4ea96 noarch/openssh-4.3p2-25.fc6.src.rpm eeafee7ed54d6acafc1853a390e05e73c896faf5 ppc/openssh-server-4.3p2-25.fc6.ppc.rpm e1d4265aacda1e9b44298cb841a7460d12a8dea2 ppc/openssh-4.3p2-25.fc6.ppc.rpm 30a4319536c7c24c231b68724b7c476365da52e8 ppc/debug/openssh-debuginfo-4.3p2-25.fc6.ppc.rpm 3797e42e4517c34f227244650d540200db14e964 ppc/openssh-clients-4.3p2-25.fc6.ppc.rpm 20f99e79df0ba9cfdfb6756906e3ae376eb9c9d0 ppc/openssh-askpass-4.3p2-25.fc6.ppc.rpm b36310f377ada7282c203cc701d981689fbeebd7 x86_64/openssh-4.3p2-25.fc6.x86_64.rpm 877916362094d3443b4b1847d85015287bd7e134 x86_64/openssh-clients-4.3p2-25.fc6.x86_64.rpm 8243870ab20446d750a309039a98016495d39940 x86_64/openssh-askpass-4.3p2-25.fc6.x86_64.rpm a16ba2e453efeb80200139da46a8e747253e6241 x86_64/openssh-server-4.3p2-25.fc6.x86_64.rpm 34774711bb4e15f2c34b05fc6750d4179b21667d x86_64/debug/openssh-debuginfo-4.3p2-25.fc6.x86_64.rpm 12d01c6072fc4b00adb901915a10a2f7dbed0ead i386/openssh-askpass-4.3p2-25.fc6.i386.rpm 069c04e6f06ea70f1bd0d92c9716d2787fb7e8c9 i386/debug/openssh-debuginfo-4.3p2-25.fc6.i386.rpm fffd8e803de28363b6e7f83baab23cde83d8b22f i386/openssh-4.3p2-25.fc6.i386.rpm 315c0f591789bc52146b42dc1b60ee947b2faddb i386/openssh-server-4.3p2-25.fc6.i386.rpm b517d9b6f741afeb0cab1c75f100292851e8a702 i386/openssh-clients-4.3p2-25.fc6.i386.rpm ORIGINAL ADVISORY: https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00214.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------