Bugtraq mailing list archives
Re: MDKSA-2000:057 - openssh update
From: Markus Friedl <markus.friedl () INFORMATIK UNI-ERLANGEN DE>
Date: Thu, 12 Oct 2000 15:58:41 +0200
hello, this makes no sense at all. the problem is about 'defects' in scp/rcp, and has nothing to do with /usr/bin/ssh having sbits turned off or not. this advisory is wrong, and missleading at its best. -markus (@openssh.com) On Tue, Oct 10, 2000 at 11:51:16AM -0600, Linux Mandrake Security Team wrote:
________________________________________________________________________ Package name: openssh Date: October 10th, 2000 Advisory ID: MDKSA-2000:057 Affected versions: 7.0, 7.1 ________________________________________________________________________ Problem Description: A problem exists with openssh's scp program. If a user uses scp to move files from a server that has been compromised, the operation can be used to replace arbitrary files on the user's system. The problem is made more serious by setuid versions of ssh which allow overwriting any file on the local user's system. If the ssh program is not setuid or is setuid to someone other than root, the intrustion is limited to files with write access granted to the owner of the ssh program. In either case, files can be overwritten with code allowing others access to the system unexpectedly. While no fix has been provided for openssh as of yet, the versions of openssh available for Linux-Mandrake 7.0 and 7.1 were setuid root. This update removes the setuid bit from the ssh program and limits the exploitability of scp somewhat. All users of Linux-Mandrake are encouraged to upgrade to these latest openssh builds. Linux-Mandrake 7.0 users will also need to upgrade openssl in order to use the 7.0 update of openssh. ________________________________________________________________________
Current thread:
- MDKSA-2000:057 - openssh update Linux Mandrake Security Team (Oct 10)
- Re: MDKSA-2000:057 - openssh update Markus Friedl (Oct 12)