Synopsis
The remote CentOS host is missing one or more security updates.
Description
Updated openssh packages that fix an authentication flaw are now available for Red Hat Enterprise Linux 3 and 4.
This update has been rated as having low security impact by the Red Hat Security Response Team.
OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. This package includes the core files necessary for both the OpenSSH client and server.
An authentication flaw was found in OpenSSH's privilege separation monitor. If it ever becomes possible to alter the behavior of the unprivileged process when OpenSSH is using privilege separation, an attacker may then be able to login without possessing proper credentials. (CVE-2006-5794)
Please note that this flaw by itself poses no direct threat to OpenSSH users. Without another security flaw that could allow an attacker to alter the behavior of OpenSSH's unprivileged process, this flaw cannot be exploited. There are currently no known flaws to exploit this behavior. However, we have decided to issue this erratum to fix this flaw to reduce the security impact if an unprivileged process flaw is ever found.
Users of openssh should upgrade to these updated packages, which contain a backported patch to resolve this issue.
Solution
Update the affected openssh packages.
Plugin Details
File Name: centos_RHSA-2006-0738.nasl
Agent: unix
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Agentless Assessment, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Vulnerability Information
CPE: p-cpe:/a:centos:centos:openssh, p-cpe:/a:centos:centos:openssh-askpass, p-cpe:/a:centos:centos:openssh-askpass-gnome, p-cpe:/a:centos:centos:openssh-clients, p-cpe:/a:centos:centos:openssh-server, cpe:/o:centos:centos:3, cpe:/o:centos:centos:4
Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list
Patch Publication Date: 11/15/2006
Vulnerability Publication Date: 11/8/2006