Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 14 Feb 2001 19:05:53 -0800
From:      Kris Kennaway <kris@obsecurity.org>
To:        Nate Williams <nate@yogotech.com>
Cc:        Kris Kennaway <kris@obsecurity.org>, Igor Roshchin <str@giganda.komkon.org>, security@FreeBSD.ORG
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-01:24.ssh
Message-ID:  <20010214190552.C78224@mollari.cthul.hu>
In-Reply-To: <14986.57825.251227.67134@nomad.yogotech.com>; from nate@yogotech.com on Wed, Feb 14, 2001 at 12:52:01PM -0700
References:  <200102140320.WAA59845@giganda.komkon.org> <20010213193348.C61478@mollari.cthul.hu> <14986.57825.251227.67134@nomad.yogotech.com>

next in thread | previous in thread | raw e-mail | index | archive | help

--Pk6IbRAofICFmK5e
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Wed, Feb 14, 2001 at 12:52:01PM -0700, Nate Williams wrote:

> I agree that 'support' is one thing, but at least mentioning which
> releases are effected by this bug would be good.
>=20
> Most of the other vendors list all of their 'effected' releases as being
> effected or not, and since most of the deployed FreeBSD systems are
> *NOT* running 4.2R, this is of great benefit to the users.

> Other information that would have been useful is a mention of whether
> the 'ssh1/ssh2' ports (www.ssh.org) in FreeBSD are vulnerable, etc...

I appreciate the feedback, but as far as I can tell all this
information was actually present in the advisory:

Affects:        FreeBSD 4.x, 4.2-STABLE prior to the correction date
                Ports collection prior to the correction date.
Corrected:      OpenSSH [FreeBSD 4.x base system]:
                   2000-12-05 (Vulnerability 1)
                   2001-02-11 (Vulnerability 2)
                OpenSSH [ports]:
                   2001-02-09 (Vulnerability 1)
                   2001-02-11 (Vulnerability 2)
                ssh [ports]:
                   2001-02-09 (Vulnerability 1)
                   2001-02-09 (Vulnerability 2)

=2E..

OpenSSH is installed if you chose to install the 'crypto' distribution
at install-time or when compiling from source, and is installed and
enabled by default as of FreeBSD 4.1.1-RELEASE.  By default SSH1
protocol support is enabled.

=2E..

An SSH1 client/server (ssh) from ssh.com is included in the ports
collection.  This software is not available free of charge for all
uses, and the FreeBSD Security Officer does not recommend its use.

=2E..

If SSH1 protocol support has been disabled in OpenSSH, it is not
vulnerable to these attacks.  They do not affect implementations of
the SSH2 protocol, such as OpenSSH run in SSH2-only mode.

Versions of the OpenSSH port prior to openssh-2.2.0_2, and versions
of the ssh port prior to ssh-1.2.27_3 are vulnerable to these attacks.

Kris
--Pk6IbRAofICFmK5e
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (FreeBSD)
Comment: For info see http://www.gnupg.org

iD8DBQE6i0eQWry0BWjoQKURAjymAKD5ASZjmnZNvJ8nz2BB7RvWTIJl9QCfcJl0
l1UGVFXTpUghQ9Ecwbp/IWc=
=UzEk
-----END PGP SIGNATURE-----

--Pk6IbRAofICFmK5e--


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010214190552.C78224>