Skip to navigation

Security Advisory Updated OpenSSH packages fix potential vulnerabilities

Advisory: RHSA-2003:279-17
Type: Security Advisory
Severity: N/A
Issued on: 2003-09-16
Last updated on: 2003-09-17
Affected Products: Red Hat Linux 7.1
Red Hat Linux 7.2
Red Hat Linux 7.3
Red Hat Linux 8.0
Red Hat Linux 9
CVEs (cve.mitre.org): CVE-2003-0682
CVE-2003-0693
CVE-2003-0695

Details

Updated OpenSSH packages are now available that fix bugs that may be
remotely exploitable.

[Updated 17 Sep 2003]
Updated packages are now available to fix additional buffer manipulation
problems which were fixed in OpenSSH 3.7.1. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2003-0695 to
these additional issues.

We have also included fixes from Solar Designer for some additional memory
bugs. The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0682 to these issues.

OpenSSH is a suite of network connectivity tools that can be used to
establish encrypted connections between systems on a network and can
provide interactive login sessions and port forwarding, among other functions.

The OpenSSH team has announced a bug which affects the OpenSSH buffer
handling code. This bug has the potential of being remotely exploitable.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0693 to this issue.

All users of OpenSSH should immediately apply this update which contains a
backported fix for this issue.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL Certificate
Errors, you need to install a version of the up2date client with an updated
certificate. The latest version of up2date is available from the Red Hat
FTP site and may also be downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

Updated packages

Red Hat Linux 7.1

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/openssh/3.1p1-13/SRPMS/openssh-3.1p1-13.src.rpm
Missing file
    MD5: 6cb8f6ed9b09b1f3f1f0564b9b1e6b55
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/openssh/3.1p1-13/i386/openssh-3.1p1-13.i386.rpm
Missing file
    MD5: 9fd288589f124600a115c4540b967546
ftp://updates.redhat.com/rhn/repository/NULL/openssh-askpass/3.1p1-13/i386/openssh-askpass-3.1p1-13.i386.rpm
Missing file
    MD5: 74d1258698990ab13ae3a6654c2ec076
ftp://updates.redhat.com/rhn/repository/NULL/openssh-askpass-gnome/3.1p1-13/i386/openssh-askpass-gnome-3.1p1-13.i386.rpm
Missing file
    MD5: c451a89e639305fc9b45ebeb22bee53c
ftp://updates.redhat.com/rhn/repository/NULL/openssh-clients/3.1p1-13/i386/openssh-clients-3.1p1-13.i386.rpm
Missing file
    MD5: 46db395a09d70a04f78f2f99d7dee598
ftp://updates.redhat.com/rhn/repository/NULL/openssh-server/3.1p1-13/i386/openssh-server-3.1p1-13.i386.rpm
Missing file
    MD5: a90461d8ed836b05db4140bdb334853d
 
Red Hat Linux 7.2

SRPMS:
ftp://updates.redhat.com/rhn/public/2703533/openssh/3.1p1-14/SRPMS/openssh-3.1p1-14.src.rpm
Missing file
    MD5: 2ffa9565705436314cf9b6dedcb30501
ftp://updates.redhat.com/rhn/repository/NULL/openssh/3.1p1-14/SRPMS/openssh-3.1p1-14.src.rpm
Missing file
    MD5: 2ffa9565705436314cf9b6dedcb30501
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/openssh/3.1p1-14/i386/openssh-3.1p1-14.i386.rpm
Missing file
    MD5: 621313655d8060a0454bd9ea24f2ecc4
ftp://updates.redhat.com/rhn/repository/NULL/openssh-askpass/3.1p1-14/i386/openssh-askpass-3.1p1-14.i386.rpm
Missing file
    MD5: 14c946af1e46502e65fd2a2e16e720af
ftp://updates.redhat.com/rhn/repository/NULL/openssh-askpass-gnome/3.1p1-14/i386/openssh-askpass-gnome-3.1p1-14.i386.rpm
Missing file
    MD5: 5d21951446986c2c9273b74bc6f24d42
ftp://updates.redhat.com/rhn/repository/NULL/openssh-clients/3.1p1-14/i386/openssh-clients-3.1p1-14.i386.rpm
Missing file
    MD5: e60ebf607207738d0b06a634c872b51e
ftp://updates.redhat.com/rhn/repository/NULL/openssh-server/3.1p1-14/i386/openssh-server-3.1p1-14.i386.rpm
Missing file
    MD5: 36f8fcd31f88ddc370fdad1d05ab2faa
 
IA-64:
ftp://updates.redhat.com/rhn/repository/NULL/openssh/3.1p1-14/ia64/openssh-3.1p1-14.ia64.rpm
Missing file
    MD5: e05d229d860a745e3deb6919657608e1
ftp://updates.redhat.com/rhn/repository/NULL/openssh-askpass/3.1p1-14/ia64/openssh-askpass-3.1p1-14.ia64.rpm
Missing file
    MD5: 40052191b71767409de985655a6ef15d
ftp://updates.redhat.com/rhn/repository/NULL/openssh-askpass-gnome/3.1p1-14/ia64/openssh-askpass-gnome-3.1p1-14.ia64.rpm
Missing file
    MD5: f65ae2b19d3925c561e3f46a655e9933
ftp://updates.redhat.com/rhn/repository/NULL/openssh-clients/3.1p1-14/ia64/openssh-clients-3.1p1-14.ia64.rpm
Missing file
    MD5: 1559e98e2067218bc76a31fd92027386
ftp://updates.redhat.com/rhn/repository/NULL/openssh-server/3.1p1-14/ia64/openssh-server-3.1p1-14.ia64.rpm
Missing file
    MD5: b2105a311ac26351368928af2e3573ca
 
Red Hat Linux 7.3

SRPMS:
ftp://updates.redhat.com/rhn/public/2703533/openssh/3.1p1-14/SRPMS/openssh-3.1p1-14.src.rpm
Missing file
    MD5: 2ffa9565705436314cf9b6dedcb30501
ftp://updates.redhat.com/rhn/repository/NULL/openssh/3.1p1-14/SRPMS/openssh-3.1p1-14.src.rpm
Missing file
    MD5: 2ffa9565705436314cf9b6dedcb30501
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/openssh/3.1p1-14/i386/openssh-3.1p1-14.i386.rpm
Missing file
    MD5: 621313655d8060a0454bd9ea24f2ecc4
ftp://updates.redhat.com/rhn/repository/NULL/openssh-askpass/3.1p1-14/i386/openssh-askpass-3.1p1-14.i386.rpm
Missing file
    MD5: 14c946af1e46502e65fd2a2e16e720af
ftp://updates.redhat.com/rhn/repository/NULL/openssh-askpass-gnome/3.1p1-14/i386/openssh-askpass-gnome-3.1p1-14.i386.rpm
Missing file
    MD5: 5d21951446986c2c9273b74bc6f24d42
ftp://updates.redhat.com/rhn/repository/NULL/openssh-clients/3.1p1-14/i386/openssh-clients-3.1p1-14.i386.rpm
Missing file
    MD5: e60ebf607207738d0b06a634c872b51e
ftp://updates.redhat.com/rhn/repository/NULL/openssh-server/3.1p1-14/i386/openssh-server-3.1p1-14.i386.rpm
Missing file
    MD5: 36f8fcd31f88ddc370fdad1d05ab2faa
 
Red Hat Linux 8.0

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/openssh/3.4p1-7/SRPMS/openssh-3.4p1-7.src.rpm
Missing file
    MD5: 47f4de9e51a25484b1e0cac9f9b4676c
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/openssh/3.4p1-7/i386/openssh-3.4p1-7.i386.rpm
Missing file
    MD5: 422872397649f06ae7953ef00ffcc319
ftp://updates.redhat.com/rhn/repository/NULL/openssh-askpass/3.4p1-7/i386/openssh-askpass-3.4p1-7.i386.rpm
Missing file
    MD5: e4f58b8ae54132ef930c6dbe852fa581
ftp://updates.redhat.com/rhn/repository/NULL/openssh-askpass-gnome/3.4p1-7/i386/openssh-askpass-gnome-3.4p1-7.i386.rpm
Missing file
    MD5: b6ea35700c46e03a4012a7f1dcef5c6d
ftp://updates.redhat.com/rhn/repository/NULL/openssh-clients/3.4p1-7/i386/openssh-clients-3.4p1-7.i386.rpm
Missing file
    MD5: 1e4af9a4cfb4e2b13858183758bf7d11
ftp://updates.redhat.com/rhn/repository/NULL/openssh-server/3.4p1-7/i386/openssh-server-3.4p1-7.i386.rpm
Missing file
    MD5: 887c34bbbd631b8093c74062bb641120
 
Red Hat Linux 9

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/openssh/3.5p1-11/SRPMS/openssh-3.5p1-11.src.rpm
Missing file
    MD5: e08da954970897a6617fa1862232afe6
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/openssh/3.5p1-11/i386/openssh-3.5p1-11.i386.rpm
Missing file
    MD5: 8598eddc12b2f06c34464a24d549d9af
ftp://updates.redhat.com/rhn/repository/NULL/openssh-askpass/3.5p1-11/i386/openssh-askpass-3.5p1-11.i386.rpm
Missing file
    MD5: 48b23604aad9ecebb9f55807c562491d
ftp://updates.redhat.com/rhn/repository/NULL/openssh-askpass-gnome/3.5p1-11/i386/openssh-askpass-gnome-3.5p1-11.i386.rpm
Missing file
    MD5: e64a662054f7efeb6a0172fdadc26c92
ftp://updates.redhat.com/rhn/repository/NULL/openssh-clients/3.5p1-11/i386/openssh-clients-3.5p1-11.i386.rpm
Missing file
    MD5: 922cf88933eeda965d6ad7534051c17e
ftp://updates.redhat.com/rhn/repository/NULL/openssh-server/3.5p1-11/i386/openssh-server-3.5p1-11.i386.rpm
Missing file
    MD5: f58b37fc0290039448c450c3eb9630df
 

References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/