Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 14 Dec 1999 09:51:04 -0700
From:      "Scott Worthington" <SWorthington@hsag.com>
To:        <freebsd-questions@FreeBSD.ORG>
Subject:   CERT Advisory CA-99.15 Buffer Overflows in SSH and RSAREF2
Message-ID:  <s8561328.090@internal.hsag.com>

next in thread | raw e-mail | index | archive | help
There is a CERT advisory that indicates (and I have a question
that follows the quotes below):

<QUOTE>
Some versions of sshd are vulnerable to a buffer overflow that can
allow an intruder to influence certain variables internal to the
program. This vulnerability alone does not allow an intruder to
execute code.
  =20
However, a vulnerability in RSAREF2, which was discovered and
researched by Core SDI, can be used in conjunction with the
vulnerability in sshd to allow a remote intruder to execute arbitrary
code.
</QUOTE>

It also indicates for FreeBSD that:

<QUOTE>
FreeBSD

FreeBSD 3.3R and prior releases contain packages with this problem.
This problem was corrected December 2, 1999 in the ports tree.
Packages built after this date with the rsaref updated should be
unaffected by this vulnerabilities. Some or all of the following ports
may be affected should be rebuilt:
  =20
   p5-Penguin, p5-Penguin-Easy, jp-pgp, ja-w3m-ssl, ko-pgp, pgpsendmail,
   pine4-ssl, premail, ParMetis, SSLtelnet, mpich, pipsecd, tund,
   nntpcache, p5-Gateway, p5-News-Article, ru-pgp, bjorb, keynote,
   OpenSSH, openssl, p5-PGP, p5-PGP-Sign, pgp, slush, ssh,
   sslproxy, stunnel, apache+mod_ssl, apache+ssl, lynx-ssl,
   w3m-ssl, zope
         =20
   Please see the FreeBSD Handbook for information on how to obtain a
   current copy of the ports tree and how to rebuild those ports which
   depend on rsaref.
</QUOTE>

My /usr/src are cvsup'ed every evening in addition to /usr/ports.
'make world' was performed Monday, Dec 13 and kernel is 3.4-RC.

I have 'make deinstall' rsaref-2.0 and attempted to=20
'make reinstall' but I get this error:

=3D=3D=3D> Patching for rsaref-2.0
=3D=3D=3D> Applying FreeBSD patches for rsaref-2.0
Ignoring previously applied (or reversed) patch.
1 out of 1 hunks ignored--saving rejects to rsaref.h.rej
*** Error code 1
Stop.

This error was generated after an initial 4 out of 4 hunks ignored
and 'make reinstall' was performed again.
The error can be generated on machines that had rsaref previously
installed as well as machines that never had rsaref installed.

Are the patches for /usr/ports/security/rsaref broken now?



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?s8561328.090>