[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2013:022 -- Mandriva openssh

ID: oval:org.secpod.oval:def:1300168Date: (C)2013-03-22   (M)2023-12-07
Class: PATCHFamily: unix




Multiple vulnerabilities has been found and corrected in openssh: The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory . The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service by periodically making many new TCP connections . The updated packages have been patched to correct these issues.

Platform:
Mandriva Enterprise Server 5.2
Product:
openssh
Reference:
MDVSA-2013:022
CVE-2012-0814
CVE-2010-5107
CVE    2
CVE-2012-0814
CVE-2010-5107
CPE    1
cpe:/o:mandriva:enterprise_server:5.2

© SecPod Technologies