1 |
-----BEGIN PGP SIGNED MESSAGE----- |
2 |
Hash: SHA1 |
3 |
|
4 |
- - - --------------------------------------------------------------------- |
5 |
GENTOO LINUX SECURITY ANNOUNCEMENT 200305-01 |
6 |
- - - --------------------------------------------------------------------- |
7 |
|
8 |
PACKAGE : openssh |
9 |
SUMMARY : timing attack leads to information disclosure |
10 |
DATE : 2003-05-02 10:03 UTC |
11 |
EXPLOIT : remote |
12 |
VERSIONS AFFECTED : <openssh-3.6.1_p2 |
13 |
FIXED VERSION : >=openssh-3.6.1_p2 |
14 |
CVE : CAN-2003-0190 |
15 |
|
16 |
- - - --------------------------------------------------------------------- |
17 |
|
18 |
|
19 |
Mediaservice.net has discovered a bug in OpenSSH that allows attackers |
20 |
to identify valid users on vulnerable systems. |
21 |
|
22 |
Read the full advisory at |
23 |
http://lab.mediaservice.net/advisory/2003-01-openssh.txt |
24 |
|
25 |
SOLUTION |
26 |
|
27 |
It is recommended that all Gentoo Linux users who are running |
28 |
net-misc/openssh upgrade to openssh-3.6.1_p2 as follows: |
29 |
|
30 |
emerge sync |
31 |
emerge openssh |
32 |
emerge clean |
33 |
|
34 |
- - - --------------------------------------------------------------------- |
35 |
aliz@g.o - GnuPG key is available at http://cvs.gentoo.org/~aliz |
36 |
- - - --------------------------------------------------------------------- |
37 |
-----BEGIN PGP SIGNATURE----- |
38 |
Version: GnuPG v1.2.1 (GNU/Linux) |
39 |
|
40 |
iD8DBQE+skJefT7nyhUpoZMRAt74AKCjytn9UHR9YILDL0eCwV18YaoP/gCgp1L/ |
41 |
H9P9IVPXLlIHsJWW9XXLfUk= |
42 |
=Yz9f |
43 |
-----END PGP SIGNATURE----- |