confusion over RSAref vul w/OpenSS[HL]
Niels Provos
provos at citi.umich.edu
Sun Dec 5 09:51:26 EST 1999
In message <m3g0xi2yqf.fsf at yakko.wtower.com>, Chris Saia writes:
> messages, I can't figure out whether I need to update OpenSSL (a
> check of their website indicates no new patches), OpenSSH, both, or
You need to update OpenSSL if you use it with RSAREF2. I just sent
the following email to Bugtraq:
Subject: Re: Security Advisory: Buffer overflow in RSAREF2
From: Niels Provos <provos at citi.umich.edu>
In-Reply-To: Gerardo Richarte, Thu, 02 Dec 1999 16:50:46 -0300
To: Gerardo Richarte <core.lists.bugtraq at CORE-SDI.COM>
Cc: BUGTRAQ at SECURITYFOCUS.COM
Date: Sat, 04 Dec 1999 17:45:20 -0500
Sender: provos at citi.umich.edu
In message <3846CC26.513CE96F at core-sdi.com>, Gerardo Richarte writes:
> To make this clear: in combination with the buffer overflow in rsaglue.
>c this makes possible to get
>a remote shell on a machine running sshd AND it also makes possible to use a r
>everse exploit to gain access on
>clients' machines, using malicious sshd.
I fear that this posting should have been even clearer.
To sum the problem up more clearly:
ssh-1.2.27 (if compiled with RSAREF2) is vulnerable. Attackers can
obtain a shell on the machine running sshd. The exploit uses buffer
overflows in the RSAREF2 implementation AND in the rsaglue.c file in
ssh-1.2.27. I am surprised that there wasnt a bigger outrage on the
mailing list about this, it is quite serious!!!
On the other hand, OpenSSH is not vulnerable to this remote exploit.
Since rsaglue.c was rewritten, OpenSSH does stricter parameter
checking than ssh-1.2.27 and these recent problems in ssh-1.2.27 did
NOT affect OpenSSH.
Nonetheless, OpenSSH users in the USA that use OpenSSL compiled with
RSAREF2 should update their ssl library (since isakmpd or httpd may be
affected), see previous postings on Bugtraq, and
http://www.openbsd.org/errata.html#sslUSA
Another thing is worth mentioning, RSA could use the buffer overflow
in RSAREF2 to scan machines in the USA for RSA license violation. For
example, sshds that do not use RSAREF2 do will behave differently than
those that do.
Information on OpenSSH can be found at http://www.openssh.com/
Infomration on OpenSSL can be found at http://www.openssl.org/
More information about the openssh-unix-dev
mailing list