Security update for OpenSSH
Knowledgebase
(Last modified: 16SEP2003)
solutions Security update for OpenSSH SuSE Linux Maintenance Web (a1b94c8b5da0188997516c960ed592d1)
SuSE eMail Server III
SuSE Firewall Adminhost VPN
SuSE Linux Admin-CD for Firewall
SuSE Firewall on CD 2 - VPN
SuSE Firewall on CD 2
SuSE Linux Connectivity Server
SuSE Linux Enterprise Server 7 for IA32
SuSE Linux Enterprise Server 7 for IA64
SuSE Linux Enterprise Server 7 for PowerPC
SuSE Linux Enterprise Server 7 for S/390 and zSeries
SuSE Linux Enterprise Server 7 for IBM zSeries
SuSE Linux Enterprise Server 8 for x86
SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
SuSE Linux Enterprise Server 8 for IBM S/390 and IBM zSeries
SuSE Linux Enterprise Server 8 for IBM zSeries
SuSE Linux Office Server
SuSE Linux Openexchange Server 4
SuSE Linux Enterprise Server 8 for IPF
SuSE Linux Enterprise Server 8 for AMD64
SuSE Linux Desktop 1.0
SuSE Linux Standard Server 8
Package: openssh
Release: 20030916
Obsoletes: none
rlogin
, rsh
).The package is installed on most SuSE products, and the SSH dÆmon (sshd, the ssh server) is activated by default on most SuSE systems to allow for secure remote administration of a system.
A coding error has been found in all currently supported versions of the OpenSSH package. This error may result in a vulnerability that may allow a remote attacker to execute arbitrary commands on the system running the
sshd
SSH server. It is yet unclear if the bugs discovered can be exploited by a remote attacker - however, an increasing amount of TCP connection attempts to the SSH port (22) has been noticed during the last few days. This may indicate that an exploit exists on the Internet.The potential vulnerability is known as the
buffer_append_space()
bug and is assigned the Common Vulnerabilities and Exposures project name CAN-2003-0693.In addition to the fix for the
buffer_append_space()
bug, this update turns off the Privilege Separation feature (See the option UsePrivilegeSeparation
in the sshd
global configuration file /etc/ssh/sshd_config
). The feature was to blame for various inconsistencies in PAM authentication mechanisms and features that are incompatible with the Privilege Separation feature. If you have modified the sshd_config
file that comes with the package, your configuration will not get overwritten by the update package.It is highly recommended to install this update package on all systems that have an OpenSSH dÆmon (
sshd
) running.rpm -Fvh openssh.rpm
After performing the update, it is necessary to restart the
sshd
secure shell dÆmon. To do this, run the following command as user root
:rcsshd restart
Already running instances with established (legitimate) ssh connections should not be influenced and should continue to run.
Download Source Packages
Download the source code of the patches for maintained products.
Disclaimer
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.