CentOS 3 / 4 : openssh (CESA-2006:0738)

high Nessus Plugin ID 37366

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated openssh packages that fix an authentication flaw are now available for Red Hat Enterprise Linux 3 and 4.

This update has been rated as having low security impact by the Red Hat Security Response Team.

OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. This package includes the core files necessary for both the OpenSSH client and server.

An authentication flaw was found in OpenSSH's privilege separation monitor. If it ever becomes possible to alter the behavior of the unprivileged process when OpenSSH is using privilege separation, an attacker may then be able to login without possessing proper credentials. (CVE-2006-5794)

Please note that this flaw by itself poses no direct threat to OpenSSH users. Without another security flaw that could allow an attacker to alter the behavior of OpenSSH's unprivileged process, this flaw cannot be exploited. There are currently no known flaws to exploit this behavior. However, we have decided to issue this erratum to fix this flaw to reduce the security impact if an unprivileged process flaw is ever found.

Users of openssh should upgrade to these updated packages, which contain a backported patch to resolve this issue.

Solution

Update the affected openssh packages.

See Also

http://www.nessus.org/u?951b9942

http://www.nessus.org/u?04866605

http://www.nessus.org/u?7111e9ab

http://www.nessus.org/u?9cb246f0

http://www.nessus.org/u?c4d657f7

http://www.nessus.org/u?18971c81

Plugin Details

Severity: High

ID: 37366

File Name: centos_RHSA-2006-0738.nasl

Version: 1.12

Type: local

Agent: unix

Published: 4/23/2009

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:centos:centos:3, p-cpe:/a:centos:centos:openssh-server, p-cpe:/a:centos:centos:openssh-clients, p-cpe:/a:centos:centos:openssh-askpass, p-cpe:/a:centos:centos:openssh, cpe:/o:centos:centos:4, p-cpe:/a:centos:centos:openssh-askpass-gnome

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Patch Publication Date: 11/15/2006

Vulnerability Publication Date: 11/8/2006

Reference Information

CVE: CVE-2006-5794

RHSA: 2006:0738