Korean
<< Back
VID 14035
Severity 30
Port 22
Protocol TCP
Class Ssh
Detailed Description The OpenSSH, according to its banner, contains a vulnerability that allows an attacker to corrupt the PAM conversion stack.
The versions 3.7p1 and 3.7.1p1 of OpenSSH can allow an attacker to corrupt the PAM conversion stack, caused by a flaw in handling PAM authentication. By exploiting this vulnerability, a remote attacker can gain elevated privileges or cause a denial of service.

* Note: This check solely relied on the banner of the remote OpenSSH server to assess this vulnerability, so this might be a false positive.

* References:
http://www.linuxsecurity.com/advisories/gentoo_advisory-3676.html
http://www.kb.cert.org/vuls/id/209807
http://archives.neohapsis.com/archives/bugtraq/2003-09/0358.html

* Platforms Affected:
OpenSSH 3.7.1p1
OpenSSH 3.7p1
Gentoo Linux Any version
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of OpenSSH (3.7.1p2 or later), available from the OpenSSH Web site at http://www.openssh.org

For Gentoo Linux:
Upgrade to the latest version of openssh (3.7.1_p2 or later), as listed in Gentoo Linux Security Announcement 200309-14 at http://www.linuxsecurity.com/advisories/gentoo_advisory-3676.html
Related URL CVE-2003-0787 (CVE)
Related URL 8677 (SecurityFocus)
Related URL 13271 (ISS)