-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Updated OpenSSH packages fix potential vulnerabilities Advisory ID: RHSA-2003:279-02 Issue date: 2003-09-16 Updated on: 2003-09-17 Product: Red Hat Linux Keywords: Cross references: Obsoletes: RHSA-2003:222 CVE Names: CAN-2003-0693 CAN-2003-0695 CAN-2003-0682 - --------------------------------------------------------------------- 1. Topic: Updated OpenSSH packages are now available that fix bugs that may be remotely exploitable. [Updated 17 Sep 2003] Updated packages are now available to fix additional buffer manipulation problems which were fixed in OpenSSH 3.7.1. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0695 to these additional issues. We have also included fixes from Solar Designer for some additional memory bugs. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0682 to these issues. 2. Relevant releases/architectures: Red Hat Linux 7.1 - i386 Red Hat Linux 7.2 - i386, ia64 Red Hat Linux 7.3 - i386 Red Hat Linux 8.0 - i386 Red Hat Linux 9 - i386 3. Problem description: OpenSSH is a suite of network connectivity tools that can be used to establish encrypted connections between systems on a network and can provide interactive login sessions and port forwarding, among other functions. The OpenSSH team has announced a bug which affects the OpenSSH buffer handling code. This bug has the potential of being remotely exploitable. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0693 to this issue. All users of OpenSSH should immediately apply this update which contains a backported fix for this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. If up2date fails to connect to Red Hat Network due to SSL Certificate Errors, you need to install a version of the up2date client with an updated certificate. The latest version of up2date is available from the Red Hat FTP site and may also be downloaded directly from the RHN website: https://rhn.redhat.com/help/latest-up2date.pxt 5. RPMs required: Red Hat Linux 7.1: SRPMS: ftp://updates.redhat.com/7.1/en/os/SRPMS/openssh-3.1p1-13.src.rpm i386: ftp://updates.redhat.com/7.1/en/os/i386/openssh-3.1p1-13.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/openssh-clients-3.1p1-13.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/openssh-server-3.1p1-13.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/openssh-askpass-3.1p1-13.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/openssh-askpass-gnome-3.1p1-13.i386.rpm Red Hat Linux 7.2: SRPMS: ftp://updates.redhat.com/7.2/en/os/SRPMS/openssh-3.1p1-14.src.rpm i386: ftp://updates.redhat.com/7.2/en/os/i386/openssh-3.1p1-14.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/openssh-clients-3.1p1-14.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/openssh-server-3.1p1-14.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/openssh-askpass-3.1p1-14.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/openssh-askpass-gnome-3.1p1-14.i386.rpm ia64: ftp://updates.redhat.com/7.2/en/os/ia64/openssh-3.1p1-14.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/openssh-clients-3.1p1-14.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/openssh-server-3.1p1-14.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/openssh-askpass-3.1p1-14.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/openssh-askpass-gnome-3.1p1-14.ia64.rpm Red Hat Linux 7.3: SRPMS: ftp://updates.redhat.com/7.3/en/os/SRPMS/openssh-3.1p1-14.src.rpm i386: ftp://updates.redhat.com/7.3/en/os/i386/openssh-3.1p1-14.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/openssh-clients-3.1p1-14.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/openssh-server-3.1p1-14.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/openssh-askpass-3.1p1-14.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/openssh-askpass-gnome-3.1p1-14.i386.rpm Red Hat Linux 8.0: SRPMS: ftp://updates.redhat.com/8.0/en/os/SRPMS/openssh-3.4p1-7.src.rpm i386: ftp://updates.redhat.com/8.0/en/os/i386/openssh-3.4p1-7.i386.rpm ftp://updates.redhat.com/8.0/en/os/i386/openssh-clients-3.4p1-7.i386.rpm ftp://updates.redhat.com/8.0/en/os/i386/openssh-server-3.4p1-7.i386.rpm ftp://updates.redhat.com/8.0/en/os/i386/openssh-askpass-3.4p1-7.i386.rpm ftp://updates.redhat.com/8.0/en/os/i386/openssh-askpass-gnome-3.4p1-7.i386.rpm Red Hat Linux 9: SRPMS: ftp://updates.redhat.com/9/en/os/SRPMS/openssh-3.5p1-11.src.rpm i386: ftp://updates.redhat.com/9/en/os/i386/openssh-3.5p1-11.i386.rpm ftp://updates.redhat.com/9/en/os/i386/openssh-clients-3.5p1-11.i386.rpm ftp://updates.redhat.com/9/en/os/i386/openssh-server-3.5p1-11.i386.rpm ftp://updates.redhat.com/9/en/os/i386/openssh-askpass-3.5p1-11.i386.rpm ftp://updates.redhat.com/9/en/os/i386/openssh-askpass-gnome-3.5p1-11.i386.rpm 6. Verification: MD5 sum Package Name - -------------------------------------------------------------------------- 6cb8f6ed9b09b1f3f1f0564b9b1e6b55 7.1/en/os/SRPMS/openssh-3.1p1-13.src.rpm 9fd288589f124600a115c4540b967546 7.1/en/os/i386/openssh-3.1p1-13.i386.rpm 74d1258698990ab13ae3a6654c2ec076 7.1/en/os/i386/openssh-askpass-3.1p1-13.i386.rpm c451a89e639305fc9b45ebeb22bee53c 7.1/en/os/i386/openssh-askpass-gnome-3.1p1-13.i386.rpm 46db395a09d70a04f78f2f99d7dee598 7.1/en/os/i386/openssh-clients-3.1p1-13.i386.rpm a90461d8ed836b05db4140bdb334853d 7.1/en/os/i386/openssh-server-3.1p1-13.i386.rpm 2ffa9565705436314cf9b6dedcb30501 7.2/en/os/SRPMS/openssh-3.1p1-14.src.rpm 621313655d8060a0454bd9ea24f2ecc4 7.2/en/os/i386/openssh-3.1p1-14.i386.rpm 14c946af1e46502e65fd2a2e16e720af 7.2/en/os/i386/openssh-askpass-3.1p1-14.i386.rpm 5d21951446986c2c9273b74bc6f24d42 7.2/en/os/i386/openssh-askpass-gnome-3.1p1-14.i386.rpm e60ebf607207738d0b06a634c872b51e 7.2/en/os/i386/openssh-clients-3.1p1-14.i386.rpm 36f8fcd31f88ddc370fdad1d05ab2faa 7.2/en/os/i386/openssh-server-3.1p1-14.i386.rpm e05d229d860a745e3deb6919657608e1 7.2/en/os/ia64/openssh-3.1p1-14.ia64.rpm 40052191b71767409de985655a6ef15d 7.2/en/os/ia64/openssh-askpass-3.1p1-14.ia64.rpm f65ae2b19d3925c561e3f46a655e9933 7.2/en/os/ia64/openssh-askpass-gnome-3.1p1-14.ia64.rpm 1559e98e2067218bc76a31fd92027386 7.2/en/os/ia64/openssh-clients-3.1p1-14.ia64.rpm b2105a311ac26351368928af2e3573ca 7.2/en/os/ia64/openssh-server-3.1p1-14.ia64.rpm 2ffa9565705436314cf9b6dedcb30501 7.3/en/os/SRPMS/openssh-3.1p1-14.src.rpm 621313655d8060a0454bd9ea24f2ecc4 7.3/en/os/i386/openssh-3.1p1-14.i386.rpm 14c946af1e46502e65fd2a2e16e720af 7.3/en/os/i386/openssh-askpass-3.1p1-14.i386.rpm 5d21951446986c2c9273b74bc6f24d42 7.3/en/os/i386/openssh-askpass-gnome-3.1p1-14.i386.rpm e60ebf607207738d0b06a634c872b51e 7.3/en/os/i386/openssh-clients-3.1p1-14.i386.rpm 36f8fcd31f88ddc370fdad1d05ab2faa 7.3/en/os/i386/openssh-server-3.1p1-14.i386.rpm 47f4de9e51a25484b1e0cac9f9b4676c 8.0/en/os/SRPMS/openssh-3.4p1-7.src.rpm 422872397649f06ae7953ef00ffcc319 8.0/en/os/i386/openssh-3.4p1-7.i386.rpm e4f58b8ae54132ef930c6dbe852fa581 8.0/en/os/i386/openssh-askpass-3.4p1-7.i386.rpm b6ea35700c46e03a4012a7f1dcef5c6d 8.0/en/os/i386/openssh-askpass-gnome-3.4p1-7.i386.rpm 1e4af9a4cfb4e2b13858183758bf7d11 8.0/en/os/i386/openssh-clients-3.4p1-7.i386.rpm 887c34bbbd631b8093c74062bb641120 8.0/en/os/i386/openssh-server-3.4p1-7.i386.rpm e08da954970897a6617fa1862232afe6 9/en/os/SRPMS/openssh-3.5p1-11.src.rpm 8598eddc12b2f06c34464a24d549d9af 9/en/os/i386/openssh-3.5p1-11.i386.rpm 48b23604aad9ecebb9f55807c562491d 9/en/os/i386/openssh-askpass-3.5p1-11.i386.rpm e64a662054f7efeb6a0172fdadc26c92 9/en/os/i386/openssh-askpass-gnome-3.5p1-11.i386.rpm 922cf88933eeda965d6ad7534051c17e 9/en/os/i386/openssh-clients-3.5p1-11.i386.rpm f58b37fc0290039448c450c3eb9630df 9/en/os/i386/openssh-server-3.5p1-11.i386.rpm These packages are GPG signed by Red Hat for security. Our key is available from https://www.redhat.com/security/keys.html You can verify each package with the following command: rpm --checksig -v <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: md5sum <filename> 7. References: http://www.openssh.com/txt/buffer.adv http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0693 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0695 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0682 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/solutions/security/news/contact.html Copyright 2003 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQE/aM6DXlSAg2UNWIIRAs/0AKCt/aNFHj64IX2lCycyZID8NER6oACglzGI JKIPfQGIXK0gb4YOLCbgvbI= =Ad+P -----END PGP SIGNATURE----- _______________________________________________ Redhat-watch-list mailing list To unsubscribe, visit: https://www.redhat.com/mailman/listinfo/redhat-watch-list