Date: Thu, 12 Apr 2001 14:03:53 -0500
From: Progeny Security Team <[email protected]>
To: [email protected]Subject: PROGENY-SA-2001-04: OpenSSH subject to traffic analysis
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
---------------------------------------------------------------------------
PROGENY LINUX SYSTEMS -- SECURITY ADVISORY PROGENY-SA-2001-04
---------------------------------------------------------------------------
Topic: OpenSSH subject to traffic analysis
Category: net
Module: openssh
Announced: 2001-04-12
Credits: Solar Designer <[email protected]>
BugTraq Mailing List <[email protected]>
Affects: Progeny Debian (openssh prior to 2.5.2p2-0progeny1)
Debian GNU/Linux (openssh prior to 2.5.2)
Vendor-Status: New Version Released (openssh_2.5.2p2-0progeny1)
Corrected: 2001-04-12
Progeny Only: NO
$Id: PROGENY-SA-2001-04,v 1.8 2001/04/12 18:02:02 jdaily Exp $
---------------------------------------------------------------------------
SYNOPSIS
A number of security problems existed in previous versions of OpenSSH
which would allow an attacker obtain sensitive information by passively
monitoring the encrypted SSH (Secure Shell) sessions.
PROBLEM DESCRIPTION
Solar Designer has conducted a very thorough analysis of several
weaknesses in implementations of the SSH protocol. These weaknesses
allow for an attacker to significantly speed up brute force attacks on
passwords. Solar Designer's complete analysis can be found at the
following page:
http://www.openwall.com/advisories/OW-003-ssh-traffic-analysis.txt
In February of 2001, Core SDI released a security announcement which
described ways in which would allow an attacker to compromise the
session of an SSH protocol 1.5 session. The detailed report is at the
following URL:
http://www.core-sdi.com/advisories/ssh1_sessionkey_recovery.htm
IMPACT
Shortcomings in the OpenSSH implementation of the SSH protocol allow
malicious third parties to compromise sensitive data.
SOLUTION
Upgrade to a fixed version of OpenSSH. You may use Progeny's OpenSSH
package, version openssh_2.5.2p2-0progeny1, for convenience.
WORKAROUND
There is no known satisfactory work around at this time.
UPDATING VIA APT-GET
1. Ensure that your /etc/apt/sources.list file has a URI for Progeny's
security update repository:
deb http://archive.progeny.com/progeny updates/newton/
2. Update your cache of available packages for apt(8).
Example:
# apt-get update
3. Using apt(8), install the new ssh package. apt(8) will download
the update, verify it's integrity with md5, and then install the
package on your system with dpkg(8).
Example:
# apt-get install ssh
UPDATING VIA DPKG
1. Using your preferred FTP/HTTP client to retrieve the following
updated files from Progeny's update archive at:
http://archive.progeny.com/pub/progeny/updates/newton/
Filename MD5 Checksum
------------------------------------ --------------------------------
ssh_2.5.2p2-0progeny1_i386.deb c64fdf411514850f3854a6395c5e178c
Example:
# wget http://archive.progeny.com/progeny/updates/newton/ssh_2.5.2p2-0progeny1_i386.deb
2. Use the md5sum command on the retrieved file to verify that it matches
the md5sum provided in this advisory:
Example:
# md5sum ssh_2.5.2p2-0progeny1_i386.deb
3. Then install the replacement package(s) using the dpkg command.
Example:
# dpkg --install ssh_2.5.2p2-0progeny1_i386.deb
MORE INFORMATION
There is no more information available at this time.
---------------------------------------------------------------------------
pub 1024D/F92D4D1F 2001-04-04 Progeny Security Team <[email protected]>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org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=6dRm
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iEYEARECAAYFAjrV7doACgkQScF9I/ktTR/+zgCdH/4Y0t29KikyLZBWaU1TEz9i
4bQAmQFsCG52uDUKrW+0UTib5j63vmXx
=uyhi
-----END PGP SIGNATURE-----