Vulnerability in Multiple SSH Implementations

Various SSH implementations have been found to be vulnerable to a stack overflow.

Steve Manzuik

February 7, 2001

1 Min Read
ITPro Today logo in a gray background | ITPro Today

Reported February 8, 2001, by BindView RAZOR Team.

VERSIONS AFFECTED

DESCRIPTIONImplementations of SSH that include the deattack.c code, which Core SDI developed to prevent cryptography attacks, are vulnerable to an integer overflow. Insufficient range control calculations in the detect_attack() function lead to a table index overflow that can result in arbitrary commands running on the vulnerable host.

VENDOR RESPONSE

The various vendors involved have been contacted and have released patches to address the problem. Check your SSH vendor's Web site to determine whether your version of SSH is vulnerable.

The original RAZOR advisory is available at:http://razor.bindview.com/publish/advisories/adv_ssh1crc.html

Core SDI also released an advisory available at:

http://listserv.ntsecurity.net/scripts/wa-ntsecurity.exe?A2=ind0102b&L=win2ksecadvice&F=&S=&P=544

CREDITDiscovered by BindView RAZOR Team.

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like