exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ssh476.txt

ssh476.txt
Posted Oct 2, 2003
Site ssh.com

SSH Communications Security announced that a vulnerability has been detected in the way it handles the decoding of BER/DER encoded packets which may result in a denial of service. The find is derived from the recent ASN.1 parsing problems discovered by NISCC. All versions from 3.0 to 3.2.5 are affected.

tags | advisory, denial of service
SHA-256 | 3324ecd2262e4c5dc21e88abef9407a8723e04a8fc0f3d179145198703413202

ssh476.txt

Change Mirror Download

SSH Communications Security
Helsinki, Finland - October 1, 2003

SSH Secure Shell Security Vulnerability in BER Decoding

Description

A vulnerability has been detected in the way Secure Shell handles the decoding of BER/DER
encoded packets. BER/DER encoding is applied in digital certificates, which are used for
authenticating a user to a host. Certificates are also commonly used for authenticating
SSL/TLS connections.
Using malformed BER/DER packets, the receiving host can potentially crash making a
Denial-of-Service (DoS) attack possible.
Please note that this vulnerability does not apply for users of non-commercial versions of
SSH Secure Shell (Unix), since the non-commercial versions do not contain ASN.1 related
libraries.

Affected Products

You are vulnerable if:
* You are using certificate based authentication in commercially available versions of SSH
Secure Shell with the "Pki" definition in the configuration file. This applies to Windows
and Unix Secure Shell Servers.
* You are using hostbased authentication for the server and the client. It is not possible
to disable certificate authentication in hostbased configurations.
* You are using the commercial or non-commercial version of the SSH Secure Shell Client for
Windows.

Your server is not vulnerable if:
* You are using password authentication only
* You use the non-commercial Unix distribution that does not contain the PKI functionality.
* You allow public key authentication WITHOUT specifying the "Pki" keyword in the server
configuration file (sshd2_config).

Action

We strongly advise you to upgrade your installation to the 3.2.9 version of SSH Secure Shell
as soon as possible.
Customers may download the SSH Secure Shell update from the Updates and Packages at Download
Section. A valid license file is required for all the binaries. Depending on your license
file the Unix binaries will function as SSH Secure Shell for Workstations or SSH Secure Shell
for Servers product. If you wish to obtain a license file, please visit our online store or
contact your sales representative.
Updating SSH Secure Shell from 3.1.x to 3.2.5
If you have a commercial license for 3.1.x or 3.2.x versions, you can install the 3.2.9
version binaries on top of the old 3.1.x or 3.2.x ones.
Updates and Packages
SSH Secure Shell for Workstations 3.2
SSH Secure Shell for Servers 3.2
SSH Secure Shell for Windows Servers 3.2

Versions

All versions from version 3.0 to 3.2.5 are affected.

SSH Communications Security is committed to utmost security

SSH Communications Security apologizes for any inconvenience caused. We take security of the
systems of our customers very seriously and do our utmost to provide secure software. We
strongly urge all customers to consider the implications of this vulnerability and to make an
educated decision on whether or not to update/upgrade.
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close