RHEL 4 : openssh (RHSA-2007:0257)

low Nessus Plugin ID 25143

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated openssh packages that fix a security issue and various bugs are now available.

This update has been rated as having low security impact by the Red Hat Security Response Team.

OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. This package includes the core files necessary for both the OpenSSH client and server.

OpenSSH stores hostnames, IP addresses, and keys in plaintext in the known_hosts file. A local attacker that has already compromised a user's SSH account could use this information to generate a list of additional targets that are likely to have the same password or key.
(CVE-2005-2666)

The following bugs have also been fixed in this update :

* The ssh client could abort the running connection when the server application generated a large output at once.

* When 'X11UseLocalhost' option was set to 'no' on systems with IPv6 networking enabled, the X11 forwarding socket listened only for IPv6 connections.

* When the privilege separation was enabled in /etc/ssh/sshd_config, some log messages in the system log were duplicated and also had timestamps from an incorrect timezone.

All users of openssh should upgrade to these updated packages, which contain backported patches to correct these issues.

Solution

Update the affected packages.

See Also

https://access.redhat.com/security/cve/cve-2005-2666

https://access.redhat.com/errata/RHSA-2007:0257

Plugin Details

Severity: Low

ID: 25143

File Name: redhat-RHSA-2007-0257.nasl

Version: 1.24

Type: local

Agent: unix

Published: 5/2/2007

Updated: 1/14/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: Low

Base Score: 1.2

Vector: CVSS2#AV:L/AC:H/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:openssh-askpass, p-cpe:/a:redhat:enterprise_linux:openssh, p-cpe:/a:redhat:enterprise_linux:openssh-server, cpe:/o:redhat:enterprise_linux:4, p-cpe:/a:redhat:enterprise_linux:openssh-askpass-gnome, p-cpe:/a:redhat:enterprise_linux:openssh-clients

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 5/1/2007

Vulnerability Publication Date: 8/23/2005

Reference Information

CVE: CVE-2005-2666

CWE: 255

RHSA: 2007:0257