The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of OpenSSH: five vulnerabilities

Synthesis of the vulnerability 

An attacker can use several vulnerabilities of OpenSSH.
Impacted systems: Mac OS X, Blue Coat CAS, Debian, VNX Operating Environment, VNX Series, BIG-IP Hardware, TMOS, Fedora, FreeBSD, HP-UX, AIX, Juniper EX-Series, Juniper J-Series, Junos OS, Junos Space, Junos Space Network Management Platform, SRX-Series, McAfee Email Gateway, Data ONTAP 7-Mode, OpenSSH, openSUSE Leap, Solaris, pfSense, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity of this alert: 2/4.
Number of vulnerabilities in this bulletin: 5.
Creation date: 19/12/2016.
Références of this alert: 1009, 1010, bulletinapr2017, CERTFR-2019-AVI-325, CVE-2016-10009, CVE-2016-10010, CVE-2016-10011, CVE-2016-10012, DLA-1500-1, DLA-1500-2, DSA-2019-131, FEDORA-2017-4767e2991d, FreeBSD-SA-17:01.openssh, HPESBUX03818, HT207615, JSA10880, JSA10940, K24324390, K31440025, K62201745, K64292204, NTAP-20171130-0002, openSUSE-SU-2017:0344-1, openSUSE-SU-2017:0674-1, pfSense-SA-17_03.webgui, RHSA-2017:2029-01, SA144, SSA-181018, SSA:2016-358-02, SUSE-SU-2018:2275-1, SUSE-SU-2018:2685-1, SUSE-SU-2018:3540-1, USN-3538-1, VIGILANCE-VUL-21419.

Description of the vulnerability 

Several vulnerabilities were announced in OpenSSH.

An attacker can bypass security features via ssh-agent, in order to escalate his privileges. [severity:2/4; CVE-2016-10009]

An attacker can bypass security features via Unix Domain Sockets, in order to escalate his privileges. [severity:2/4; CVE-2016-10010]

An attacker can bypass security features via Privilege-separated Child realloc(), in order to obtain sensitive information. [severity:1/4; CVE-2016-10011]

An attacker can generate a buffer overflow via Pre-authentication Compression, in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2016-10012]

An attacker can bypass security features via AllowUser/DenyUsers Address Ranges, in order to escalate his privileges. [severity:2/4]
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This computer vulnerability alert impacts software or systems such as Mac OS X, Blue Coat CAS, Debian, VNX Operating Environment, VNX Series, BIG-IP Hardware, TMOS, Fedora, FreeBSD, HP-UX, AIX, Juniper EX-Series, Juniper J-Series, Junos OS, Junos Space, Junos Space Network Management Platform, SRX-Series, McAfee Email Gateway, Data ONTAP 7-Mode, OpenSSH, openSUSE Leap, Solaris, pfSense, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.

Our Vigil@nce team determined that the severity of this computer threat alert is medium.

The trust level is of type confirmed by the editor, with an origin of intranet client.

This bulletin is about 5 vulnerabilities.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a beginner ability can exploit this security vulnerability.

Solutions for this threat 

OpenSSH: version 7.4.
The version 7.4 is fixed:
  http://www.openssh.com/

Apple Mac OS X: version 10.12.4.
The version 10.12.4 is fixed.

Copssh: version 5.8.0.
The version 5.8.0 is fixed:
  https://www.itefix.net/

Debian 8: new openssh packages.
New packages are available:
  Debian 8: openssh 1:6.7p1-5+deb8u7

Dell EMC VNXe3200: version 3.1.10.9946299.
The version 3.1.10.9946299 is fixed:
  https://www.dell.com/

F5 BIG-IP: solution for OpenSSH.
The solution is indicated in information sources.

Fedora: new openssh packages.
New packages are available:
  Fedora 25: openssh 7.4p1-1.fc25

FreeBSD: solution for OpenSSH.
Fixed revisions of the source code are stated in information sources. Binary patches are available via freebsd-update.

HP-UX Secure Shell: version A.07.40.003.
The version A.07.40.003 is fixed:
  https://support.hpe.com/hpsc/doc/public/display?sp4ts.oid=3217840&docLocale=en_US&docId=emr_na-a00044567en_us

IBM AIX: patch for OpenSSH.
A patch is indicated in information sources for AIX 5.3 to 7.2.

Junos OS: fixed versions for OpenSSH.
Fixed versions are indicated in information sources.

Junos Space: version 18.2R1.
The version 18.2R1 is fixed.

McAfee Email Gateway: patch for OpenSSH.
A patch is indicated in information sources.

NetApp Data ONTAP: solution for OpenSSH.
The solution is indicated in information sources.

openSUSE Leap 42: new openssh packages.
New packages are available:
  openSUSE Leap 42.1: openssh 6.6p1-17.1
  openSUSE Leap 42.2: openssh 7.2p2-9.1

Oracle Solaris: patch for third party software of April 2017 v2.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

pfSense: version 2.3.3.
The version 2.3.3 is fixed:
  https://www.pfsense.org/download/

RHEL 7: new openssh packages.
New packages are available:
  RHEL 7: openssh 7.4p1-11.el7

Slackware: new openssh packages.
New packages are available:
  Slackware 13.0: openssh 7.4p1-*-1_slack13.0
  Slackware 13.1: openssh 7.4p1-*-1_slack13.1
  Slackware 13.37: openssh 7.4p1-*-1_slack13.37
  Slackware 14.0: openssh 7.4p1-*-1_slack14.0
  Slackware 14.1: openssh 7.4p1-*-1_slack14.1
  Slackware 14.2: openssh 7.4p1-*-1_slack14.2

SUSE LE 11 SP3: new openssh packages.
New packages are available:
  SUSE LE 11 SP3: openssh 6.2p2-0.41.5.1

SUSE LE 11 SP4: new openssh packages.
New packages are available:
  SUSE LE 11 SP4: openssh 6.6p1-36.3.1

SUSE LE 12 RTM/SP1: new openssh packages.
New packages are available:
  SUSE LE 12 RTM: openssh 6.6p1-54.15.2
  SUSE LE 12 SP1: openssh 6.6p1-54.15.2

Ubuntu: new openssh-server packages.
New packages are available:
  Ubuntu 17.10: openssh-server 1:7.5p1-10ubuntu0.1
  Ubuntu 16.04 LTS: openssh-server 1:7.2p2-4ubuntu2.4
  Ubuntu 14.04 LTS: openssh-server 1:6.6p1-2ubuntu2.10
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides computer vulnerability bulletins. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.