RE: SSH Sploit... and workaround


Subject: RE: SSH Sploit... and workaround
From: Leif Sawyer (lsawyer@gci.com)
Date: Wed Jun 26 2002 - 08:32:54 AKDT


Yep, and here's a quick way to help you in the interim:

----
ISS X-Force recommends that system administrators disable unused OpenSSH
authentication mechanisms. Administrators can remove this vulnerability
by disabling the Challenge-Response authentication parameter within the
OpenSSH daemon configuration file. This filename and path is typically:
/etc/ssh/sshd_config. To disable this parameter, locate the
corresponding line and change it to the line below:

ChallengeResponseAuthentication no

The "sshd" process must be restarted for this change to take effect. This workaround will permanently remove the vulnerability. X-Force recommends that administrators upgrade to OpenSSH version 3.4 immediately. This version implements privilege separation, contains a patch to block this vulnerability, and contains many additional pro- active security fixes. Privilege separation was designed to limit exposure to known and unknown vulnerabilities. Visit http://www.openssh.com for more information.

-------

> -----Original Message----- > From: FeLoNiouS MoNK [mailto:codered@gci.net] > Sent: Wednesday, June 26, 2002 8:25 AM > To: aklug@aklug.org > Subject: SSH Sploit... > > > i dont know if the openSSH users have seen this but it might > be informative to all... > > http://www.debian.org/security/2002/dsa-134 > > --------- > To unsubscribe, send email to <aklug-request@aklug.org> > with 'unsubscribe' in the message body. >

--------- To unsubscribe, send email to <aklug-request@aklug.org> with 'unsubscribe' in the message body.



This archive was generated by hypermail 2a23 : Wed Jun 26 2002 - 11:01:33 AKDT