[21793] in bugtraq

home help back first fref pref prev next nref lref last post

RE: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0

daemon@ATHENA.MIT.EDU (Jonathan A. Zdziarski)
Mon Jul 23 15:38:53 2001

From: "Jonathan A. Zdziarski" <jonathan.zdziarski@micromuse.com>
To: "Jaime BENJUMEA" <benjumea@dte.us.es>,
        "Stephanie Thomas" <customer.service@ssh.com>
Cc: <bugtraq@securityfocus.com>
Date: Mon, 23 Jul 2001 13:12:07 -0400
Message-ID: <COEPIIFFJPONEJNLHKOEIEGDCBAA.jonathan.zdziarski@micromuse.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
In-Reply-To: <Pine.LNX.4.21.0107211822500.26082-100000@teclix.dte.us.es>

Both 2.3.0 and 2.4.0 don't appear to be vulnerable on my system (Intel
Solaris 8).  3.0.0 *was* vulnerable, however, and I was able to easily
exploit the system.

-----Original Message-----
From: Jaime BENJUMEA [mailto:benjumea@dte.us.es]
Sent: Saturday, July 21, 2001 12:27 PM
To: Stephanie Thomas
Cc: bugtraq@securityfocus.com
Subject: Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0



Stephanie Thomas wrote:

>
> A potential remote root exploit has been discovered
> in SSH Secure Shell 3.0.0, for Unix only, concerning
> accounts with password fields consisting of two or
> fewer characters. Unauthorized users could potentially
> log in to these accounts using any password, including
> an empty password.  This affects SSH Secure Shell 3.0.0
> for Unix only.  This is a problem with password

Does anybody know if previous versions (2.4) are also affected?





home help back first fref pref prev next nref lref last post