Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 26 Jun 2002 12:22:21 -0300
From:      Fernando Schapachnik <fschapachnik@vianetworks.com.ar>
To:        freebsd-security@freebsd.org
Subject:   [openssh-unix-announce] OpenSSH Security Advisory (adv.iss) (fwd)
Message-ID:  <20020626122221.A52287@ns1.via-net-works.net.ar>

next in thread | raw e-mail | index | archive | help

This explains the problem pretty well.

----- Forwarded message from Markus Friedl <markus@openbsd.org> -----

From: Markus Friedl <markus@openbsd.org>
To: openssh-unix-announce@mindrot.org
User-Agent: Mutt/1.3.28i
Subject: [openssh-unix-announce] OpenSSH Security Advisory (adv.iss)
Errors-To: openssh-unix-announce-admin@mindrot.org
X-BeenThere: openssh-unix-announce@mindrot.org
X-Mailman-Version: 2.0.8
Precedence: bulk
Reply-To: openssh@openssh.com
List-Help: <mailto:openssh-unix-announce-request@mindrot.org?subject=help>
List-Post: <mailto:openssh-unix-announce@mindrot.org>
List-Subscribe: <http://www.mindrot.org/mailman/listinfo/openssh-unix-announce>,
	<mailto:openssh-unix-announce-request@mindrot.org?subject=subscribe>
List-Id: Announcements of OpenSSH releases <openssh-unix-announce.mindrot.org>
List-Unsubscribe: <http://www.mindrot.org/mailman/listinfo/openssh-unix-announce>,
	<mailto:openssh-unix-announce-request@mindrot.org?subject=unsubscribe>
List-Archive: <http://www.mindrot.org/pipermail/openssh-unix-announce/>;
Date: Wed, 26 Jun 2002 16:42:09 +0200

1. Versions affected:

        All versions of OpenSSH's sshd between 2.9.9 and 3.3
        contain an input validation error that can result in
        an integer overflow and privilege escalation.

        OpenSSH 3.4 and later are not affected.

        OpenSSH 3.2 and later prevent privilege escalation
        if UsePrivilegeSeparation is enabled in sshd_config.
        OpenSSH 3.3 enables UsePrivilegeSeparation by
        default.

        Although OpenSSH 2.9 and earlier are not affected
        upgrading to OpenSSH 3.4 is recommended, because
        OpenSSH 3.4 adds checks for a class of potential bugs.

2. Impact:

        This bug can be exploited remotely if
        ChallengeResponseAuthentication is enabled in sshd_config.

	Affected are at least systems supporting
	s/key over SSH protocol version 2 (OpenBSD, FreeBSD
	and NetBSD as well as other systems supporting
	s/key with SSH).  Exploitablitly of systems
	using PAM in combination has not been verified.

3. Short-Term Solution:
	
        Disable ChallengeResponseAuthentication in sshd_config.

	or

        Enable UsePrivilegeSeparation in sshd_config.

4. Solution:

	Upgrade to OpenSSH 3.4 or apply the following patches.

5. Credits:

	ISS.

Appendix:

A:

Index: auth2-chall.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/auth2-chall.c,v
retrieving revision 1.18
diff -u -r1.18 auth2-chall.c
--- auth2-chall.c	19 Jun 2002 00:27:55 -0000	1.18
+++ auth2-chall.c	26 Jun 2002 09:37:03 -0000
@@ -256,6 +256,8 @@
 
 	authctxt->postponed = 0;	/* reset */
 	nresp = packet_get_int();
+	if (nresp > 100)
+		fatal("input_userauth_info_response: nresp too big %u", nresp);
 	if (nresp > 0) {
 		response = xmalloc(nresp * sizeof(char*));
 		for (i = 0; i < nresp; i++)

B:

Index: auth2-pam.c
===================================================================
RCS file: /var/cvs/openssh/auth2-pam.c,v
retrieving revision 1.12
diff -u -r1.12 auth2-pam.c
--- auth2-pam.c	22 Jan 2002 12:43:13 -0000	1.12
+++ auth2-pam.c	26 Jun 2002 10:12:31 -0000
@@ -140,6 +140,15 @@
 	nresp = packet_get_int();	/* Number of responses. */
 	debug("got %d responses", nresp);
 
+
+	if (nresp != context_pam2.num_expected)
+		fatal("%s: Received incorrect number of responses "
+		    "(expected %u, received %u)", __func__, nresp,
+		    context_pam2.num_expected);
+
+	if (nresp > 100)
+		fatal("%s: too many replies", __func__);
+
 	for (i = 0; i < nresp; i++) {
 		int j = context_pam2.prompts[i];
 
_______________________________________________
openssh-unix-announce@mindrot.org mailing list
http://www.mindrot.org/mailman/listinfo/openssh-unix-announce

----- End forwarded message -----



Lic. Fernando P. Schapachnik
fschapachnik@vianetworks.com.ar

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020626122221.A52287>