Subject: RE: SSH Sploit... and workaround
From: Leif Sawyer (lsawyer@gci.com)
Date: Wed Jun 26 2002 - 08:32:54 AKDT
Yep, and here's a quick way to help you in the interim:
---- ISS X-Force recommends that system administrators disable unused OpenSSH authentication mechanisms. Administrators can remove this vulnerability by disabling the Challenge-Response authentication parameter within the OpenSSH daemon configuration file. This filename and path is typically: /etc/ssh/sshd_config. To disable this parameter, locate the corresponding line and change it to the line below:ChallengeResponseAuthentication no
The "sshd" process must be restarted for this change to take effect. This workaround will permanently remove the vulnerability. X-Force recommends that administrators upgrade to OpenSSH version 3.4 immediately. This version implements privilege separation, contains a patch to block this vulnerability, and contains many additional pro- active security fixes. Privilege separation was designed to limit exposure to known and unknown vulnerabilities. Visit http://www.openssh.com for more information.
-------
> -----Original Message----- > From: FeLoNiouS MoNK [mailto:codered@gci.net] > Sent: Wednesday, June 26, 2002 8:25 AM > To: aklug@aklug.org > Subject: SSH Sploit... > > > i dont know if the openSSH users have seen this but it might > be informative to all... > > http://www.debian.org/security/2002/dsa-134 > > --------- > To unsubscribe, send email to <aklug-request@aklug.org> > with 'unsubscribe' in the message body. >
--------- To unsubscribe, send email to <aklug-request@aklug.org> with 'unsubscribe' in the message body.
This archive was generated by hypermail 2a23 : Wed Jun 26 2002 - 11:01:33 AKDT