[19155] in bugtraq

home help back first fref pref prev next nref lref last post

Re: SSH1 vulnerability ?

daemon@ATHENA.MIT.EDU (Markus Friedl)
Mon Feb 12 17:40:40 2001

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-ID:  <20010211131509.A27585@faui02.informatik.uni-erlangen.de>
Date:         Sun, 11 Feb 2001 13:15:09 +0100
Reply-To: Markus Friedl <Markus.Friedl@INFORMATIK.UNI-ERLANGEN.DE>
From: Markus Friedl <Markus.Friedl@INFORMATIK.UNI-ERLANGEN.DE>
X-To:         ssh@clinet.fi
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.LNX.4.10.10102111351490.22997-100000@mystery.acr.fi>; from
              ylo@ssh.com on Sun, Feb 11, 2001 at 01:53:13PM +0200

Tatu Ylonen wrote:

> > > It's real enough for most vendors to respond. I think you want
> > > to make sure your servers have at least 1.2.30/2.4.0 or
> > > openssh 2.3.0p1 at this point.
> >
> > well, 1.2.30 does not contain a fix for this problem.
>
> No, but the current version is ssh-2.4.0, which does not suffer from this
> problem at all.

Well, you have to be very careful.

This is only true if ssh-2.4.0 has fallback to ssh1 disabled
and since the posting says "1.2.30/2.4.0" it implies that ssh1 support
is enabled.

So I'd like to point out again that:

	1) ssh-2.4.0 is vulnerable iff fallback to ssh1 is enabled
	   (unless if falls back to openssh-2.3.0p1, but I assume that
	   this is very unlikely).

	2) openssh-2.3.0p1 is _not_ vulnerable at all.

Note that it's not unlikely that ssh-2.x installations have ssh1 fallback
_enabled_  (> 50% in the network I did check).

-m

home help back first fref pref prev next nref lref last post