Is OpenSSH vulnerable to the ZLIB problem or isn't it?
Nicolas Williams
Nicolas.Williams at ubsw.com
Thu Apr 4 04:44:01 EST 2002
On Wed, Apr 03, 2002 at 10:31:08AM -0800, dale at accentre.com wrote:
> On Wed, Apr 03, 2002 at 11:08:44AM -0600, Dave Dykstra wrote:
> > I'm disappointed that nobody has replied to my question. OpenSSH
> > development team, isn't the potential for a remote root exploit something
> > that's important to you? Many other tools that use zlib have issued a
> > public statement saying they are or they are not vulnerable.
>
> The issue has been discussed on this list. I quote:
[...]
> > I can't speak to the rest of your questions, but because the portable
> > tree doesn't bundle its own copy of zlib, OpenSSH links against the
> > version installed on the system it's being compiled on. Usually that's
> > a shared library if your OS has shared libraries, but it's going to be
> > OS-specific.
This is not a complete answer. A complete answer would be:
"SSHv2 is resistant to exploits of the ZLib bug, and so is OpenSSH when
linked a zlib 1.1.3. But to be sure upgrade to Zlib 1.1.4."
Or
"SSHv2 is not resistant to exploits of the ZLib bug. OpenSSH linked
with zlib 1.1.3 is vulnerable."
The protocol specific issue (i.e., "is SSHv2 resistant to the ZLib
bug?") could be discussed on the IETF SECSH list. Even if SSHv2 is not
resistant to the ZLib bug OpenSSH might be for whatever reason (for
example, the malloc()/free() implementation of a given platform has well
defined harmless behaviour with double-free()s).
Cheers,
Nico
--
-DISCLAIMER: an automatically appended disclaimer may follow. By posting-
-to a public e-mail mailing list I hereby grant permission to distribute-
-and copy this message.-
Visit our website at http://www.ubswarburg.com
This message contains confidential information and is intended only
for the individual named. If you are not the named addressee you
should not disseminate, distribute or copy this e-mail. Please
notify the sender immediately by e-mail if you have received this
e-mail by mistake and delete this e-mail from your system.
E-mail transmission cannot be guaranteed to be secure or error-free
as information could be intercepted, corrupted, lost, destroyed,
arrive late or incomplete, or contain viruses. The sender therefore
does not accept liability for any errors or omissions in the contents
of this message which arise as a result of e-mail transmission. If
verification is required please request a hard-copy version. This
message is provided for informational purposes and should not be
construed as a solicitation or offer to buy or sell any securities or
related financial instruments.
More information about the openssh-unix-dev
mailing list