Amazon Linux AMI : openssh (ALAS-2012-99)

low Nessus Plugin ID 69706

Synopsis

The remote Amazon Linux AMI host is missing a security update.

Description

A denial of service flaw was found in the OpenSSH GSSAPI authentication implementation. A remote, authenticated user could use this flaw to make the OpenSSH server daemon (sshd) use an excessive amount of memory, leading to a denial of service. GSSAPI authentication is enabled by default ('GSSAPIAuthentication yes' in '/etc/ssh/sshd_config'). (CVE-2011-5000)

Solution

Run 'yum update openssh' to update your system.

See Also

https://alas.aws.amazon.com/ALAS-2012-99.html

Plugin Details

Severity: Low

ID: 69706

File Name: ala_ALAS-2012-99.nasl

Version: 1.5

Type: local

Agent: unix

Published: 9/4/2013

Updated: 4/18/2018

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Low

Base Score: 3.5

Vector: CVSS2#AV:N/AC:M/Au:S/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:openssh-clients, p-cpe:/a:amazon:linux:pam_ssh_agent_auth, p-cpe:/a:amazon:linux:openssh-server, p-cpe:/a:amazon:linux:openssh-ldap, cpe:/o:amazon:linux, p-cpe:/a:amazon:linux:openssh, p-cpe:/a:amazon:linux:openssh-debuginfo

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Patch Publication Date: 7/5/2012

Reference Information

CVE: CVE-2011-5000

ALAS: 2012-99

RHSA: 2012:0884