vulnerability diagnosis in "nessus" incorrect...

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




concerning remote root exploit vulnerability in ssh prior to 1.2.32...

vulnerability diagnosis in "nessus" incorrect leading to possible false
sense of security.

As you know, ssh prior to 1.2.32 is vulnerable to remote
root exploit.  The diagnostic from security vulnerability
detector tool www.nessus.org incorrectly identifies the
risk as a command insertion vulnerability.  The difference in
risk is huge, and I believe the false diagnostic from nessus
could give users a false sense of security.


http://cgi.nessus.org/plugins/dump.php3?id=10607

says...

>You are running a version of SSH which is older than version 1.2.32, or a
>version of OpenSSH which is older than 2.3.0.
>
>This version is vulnerable to a flaw which allows an attacker to insert
>arbitrary commands in a ssh stream.
>
>Solution : Upgrade to version 1.2.32 of SSH which solves this problem, or
>to version 2.3.0 of OpenSSH
>
>http://www.core-sdi.com/advisories/ssh1_deattack.htm
>
>Risk factor : High



------------------------------------------------------------------------
Bruce Campbell
Engineering Computing
University of Waterloo
http://www.eng.uwaterloo.ca/~bruce/
519-888-4567 ext. 5889
PGP Key: http://www.eng.uwaterloo.ca/~bruce/public.txt





[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux