zlib compression, the exploit, and OpenSSH
Damien Miller
djm at mindrot.org
Thu Mar 14 08:29:55 EST 2002
On Wed, 13 Mar 2002, ewheeler at kaico.com wrote:
> Attached is a zlib advisory and a debug dump of ssh with compression
> enabled. Most of the debug is superflous, so I have underlined the two
> points to look at. When creating an ssh connection, compression on the
> line is done *before* authentication -- This means an unauthorized
> attacker could, conceivable, leverage root access by connecting with to
> the ssh server requesting zlib compression and sending a specialy tailored
> packet. The CERT advisory for zlib's bug is also attached.
>
> I would like to start a discussion on the following points:
>
> 1. What is the exposure to this bug?
The vulnerability can be triggered, but whether this can be leveraged
into an exploit remains to be seen.
> 2. What are the logistics of moving all non-critical external library
> calls (zlib in this case, but others if they exist) *after*
> authentication?
Not easy, what's "non-critical"?
> 3. Does OpenSSH statically link (or can it/does it by default) to the
> zlib library -- will updating the zlib library to 1.1.4 take care of the
> situation?
Depends on the system.
> 4. Are there any proactive measures besides moving non-critical library
> calls after authentication which could be done within the OpenSSH code?
Work is underway to improve things:
http://www.citi.umich.edu/u/provos/ssh/privsep.html
-d
More information about the openssh-unix-dev
mailing list