From 4f2d7949f03e1c198bc888f2d05f421d35c57e21 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Mon, 9 Oct 2017 18:53:29 +0100 Subject: reinit the tree, so we can have metadata --- metadata/glsa/glsa-200804-03.xml | 78 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 78 insertions(+) create mode 100644 metadata/glsa/glsa-200804-03.xml (limited to 'metadata/glsa/glsa-200804-03.xml') diff --git a/metadata/glsa/glsa-200804-03.xml b/metadata/glsa/glsa-200804-03.xml new file mode 100644 index 000000000000..00dad43b171d --- /dev/null +++ b/metadata/glsa/glsa-200804-03.xml @@ -0,0 +1,78 @@ + + + + OpenSSH: Privilege escalation + + Two flaws have been discovered in OpenSSH which could allow local attackers + to escalate their privileges. + + openssh + 2008-04-05 + 2008-04-05: 01 + 214985 + 215702 + local + + + 4.7_p1-r6 + 4.7_p1-r6 + + + +

+ OpenSSH is a complete SSH protocol implementation that includes an SFTP + client and server support. +

+
+ +

+ Two issues have been discovered in OpenSSH: +

+
    +
  • Timo Juhani + Lindfors discovered that OpenSSH sets the DISPLAY variable in SSH + sessions using X11 forwarding even when it cannot bind the X11 server + to a local port in all address families (CVE-2008-1483).
  • +
  • OpenSSH will execute the contents of the ".ssh/rc" file even when + the "ForceCommand" directive is enabled in the global sshd_config + (CVE-2008-1657).
  • +
+
+ +

+ A local attacker could exploit the first vulnerability to hijack + forwarded X11 sessions of other users and possibly execute code with + their privileges, disclose sensitive data or cause a Denial of Service, + by binding a local X11 server to a port using only one address family. + The second vulnerability might allow local attackers to bypass intended + security restrictions and execute commands other than those specified + by "ForceCommand" if they are able to write to their home directory. +

+
+ +

+ There is no known workaround at this time. +

+
+ +

+ All OpenSSH users should upgrade to the latest version: +

+ + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/openssh-4.7_p1-r6" +
+ + CVE-2008-1483 + CVE-2008-1657 + + + rbu + + + rbu + + + rbu + +
-- cgit v1.2.3