<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: another ssh bug - PAM? in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/another-ssh-bug-pam/m-p/3081866#M142845</link>
    <description>I'd also want to stay current on pam itself.&lt;BR /&gt; &lt;BR /&gt;&lt;A href="http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=J5849AA" target="_blank"&gt;http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=J5849AA&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt; &lt;BR /&gt;SEP</description>
    <pubDate>Tue, 30 Sep 2003 11:33:18 GMT</pubDate>
    <dc:creator>Steven E. Protter</dc:creator>
    <dc:date>2003-09-30T11:33:18Z</dc:date>
    <item>
      <title>another ssh bug - PAM?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/another-ssh-bug-pam/m-p/3081863#M142842</link>
      <description>Now getting reports of a new vulnerability affecting the PAM code in OpenSSH. Does anyone know if/how this hits HP's versions and fixes?&lt;BR /&gt;&lt;BR /&gt;Thanks!</description>
      <pubDate>Tue, 30 Sep 2003 11:13:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/another-ssh-bug-pam/m-p/3081863#M142842</guid>
      <dc:creator>jmb</dc:creator>
      <dc:date>2003-09-30T11:13:31Z</dc:date>
    </item>
    <item>
      <title>Re: another ssh bug - PAM?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/another-ssh-bug-pam/m-p/3081864#M142843</link>
      <description>There has been a recent release of security bug fixes with HP's port of openssh 3.6, which is called secure shell.&lt;BR /&gt; &lt;BR /&gt;HP indicates it deals with recent cert security bullitens.&lt;BR /&gt; &lt;BR /&gt;Here is a link.&lt;BR /&gt; &lt;BR /&gt;&lt;A href="http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=T1471AA" target="_blank"&gt;http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=T1471AA&lt;/A&gt;&lt;BR /&gt; &lt;BR /&gt;SEP</description>
      <pubDate>Tue, 30 Sep 2003 11:24:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/another-ssh-bug-pam/m-p/3081864#M142843</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-09-30T11:24:00Z</dc:date>
    </item>
    <item>
      <title>Re: another ssh bug - PAM?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/another-ssh-bug-pam/m-p/3081865#M142844</link>
      <description>Its for 3.7/3.7.1. HP version is 3.61. &lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.openssh.com/txt/sshpam.adv" target="_blank"&gt;http://www.openssh.com/txt/sshpam.adv&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www4.itrc.hp.com/service/cki/secBullArchive.do?admit=-938907319+1064939067860+28353475" target="_blank"&gt;http://www4.itrc.hp.com/service/cki/secBullArchive.do?admit=-938907319+1064939067860+28353475&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 30 Sep 2003 11:31:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/another-ssh-bug-pam/m-p/3081865#M142844</guid>
      <dc:creator>Zeev Schultz</dc:creator>
      <dc:date>2003-09-30T11:31:38Z</dc:date>
    </item>
    <item>
      <title>Re: another ssh bug - PAM?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/another-ssh-bug-pam/m-p/3081866#M142845</link>
      <description>I'd also want to stay current on pam itself.&lt;BR /&gt; &lt;BR /&gt;&lt;A href="http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=J5849AA" target="_blank"&gt;http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=J5849AA&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt; &lt;BR /&gt;SEP</description>
      <pubDate>Tue, 30 Sep 2003 11:33:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/another-ssh-bug-pam/m-p/3081866#M142845</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-09-30T11:33:18Z</dc:date>
    </item>
    <item>
      <title>Re: another ssh bug - PAM?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/another-ssh-bug-pam/m-p/3081867#M142846</link>
      <description>HP's version is VULNERABLE....&lt;BR /&gt;&lt;BR /&gt;Install Build OpenSSH 3.7.1p2... This addresses both the buffer overflow and PAM issue of Septmber 2003.&lt;BR /&gt;&lt;BR /&gt;HP's officially built SSH is still at 3.6.1p2.... The Connect site has a pre-built 3.7.1.p2 ready for download and build just a few days ago...&lt;BR /&gt;&lt;BR /&gt;As more vulnerabilities would probably be on the horizon, it is better to have your own build environment where you can quickly patch the sources and rebuild... Get gcc 3.3.1, OpenSSH sources and dependencies - Zlib, tcpwrappers and openSSL plus HP's KRNG (strong randomness) package..&lt;BR /&gt;&lt;BR /&gt;HTH.&lt;BR /&gt;</description>
      <pubDate>Tue, 30 Sep 2003 12:27:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/another-ssh-bug-pam/m-p/3081867#M142846</guid>
      <dc:creator>Alzhy</dc:creator>
      <dc:date>2003-09-30T12:27:22Z</dc:date>
    </item>
    <item>
      <title>Re: another ssh bug - PAM?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/another-ssh-bug-pam/m-p/3081868#M142847</link>
      <description>Just curious why you say HP's is vulnerable, when the problem hit in 3.7, and Secure Shell's release is 3.6?  That appears to be the explanation above...</description>
      <pubDate>Tue, 30 Sep 2003 12:34:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/another-ssh-bug-pam/m-p/3081868#M142847</guid>
      <dc:creator>jmb</dc:creator>
      <dc:date>2003-09-30T12:34:35Z</dc:date>
    </item>
    <item>
      <title>Re: another ssh bug - PAM?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/another-ssh-bug-pam/m-p/3081869#M142848</link>
      <description>The buffer overflow applies to all versions up to 3.7.1. 3.7.1p1 solves the buffer overflow. 3.7.1.p2 solves the PAM thingy...&lt;BR /&gt;&lt;BR /&gt;I don't think the SEP2003 HP SSH is patched yet as the sources are based on 3.6.1p2.&lt;BR /&gt;</description>
      <pubDate>Tue, 30 Sep 2003 12:45:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/another-ssh-bug-pam/m-p/3081869#M142848</guid>
      <dc:creator>Alzhy</dc:creator>
      <dc:date>2003-09-30T12:45:15Z</dc:date>
    </item>
    <item>
      <title>Re: another ssh bug - PAM?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/another-ssh-bug-pam/m-p/3081870#M142849</link>
      <description>&lt;A href="http://www.openssh.com/txt/buffer.adv" target="_blank"&gt;http://www.openssh.com/txt/buffer.adv&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The question is if the patch is included.&lt;BR /&gt;&lt;BR /&gt;Another soultion: Upgrade to OpenSSH 3.7.1 &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 30 Sep 2003 16:46:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/another-ssh-bug-pam/m-p/3081870#M142849</guid>
      <dc:creator>Krzysztof Grudzinski</dc:creator>
      <dc:date>2003-09-30T16:46:16Z</dc:date>
    </item>
    <item>
      <title>Re: another ssh bug - PAM?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/another-ssh-bug-pam/m-p/3081871#M142850</link>
      <description>Folks,&lt;BR /&gt;As it seems to me hp provided includes fix posted on the openssh site. The one called &lt;BR /&gt;buffer overflow - &lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.cert.org/advisories/CA-2003-24.html" target="_blank"&gt;http://www.cert.org/advisories/CA-2003-24.html&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;Now as to PAM bug, I understood from openssh site that it's about a new pam code introduced in 3.7.&lt;BR /&gt;&lt;BR /&gt;I don't know what portion of PAM code is affected in the OpenSSH version, but I assume (based on previous pam related bugs in the openssh , like this one ie: &lt;BR /&gt;&lt;A href="http://www.securityfocus.com/bid/5093/discussion/" target="_blank"&gt;http://www.securityfocus.com/bid/5093/discussion/&lt;/A&gt; ) that it will be about those settings in sshd.conf:&lt;BR /&gt;ChallengeResponseAuthentication &lt;BR /&gt;PasswordAuthentication yes &lt;BR /&gt;PAMAuthenticationViaKbdInt &lt;BR /&gt;&lt;BR /&gt;I personally prefer user public key authentication and not to use pam.&lt;BR /&gt;</description>
      <pubDate>Wed, 01 Oct 2003 04:14:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/another-ssh-bug-pam/m-p/3081871#M142850</guid>
      <dc:creator>Zeev Schultz</dc:creator>
      <dc:date>2003-10-01T04:14:00Z</dc:date>
    </item>
    <item>
      <title>Re: another ssh bug - PAM?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/another-ssh-bug-pam/m-p/3081872#M142851</link>
      <description>** Another New Alert **&lt;BR /&gt;&lt;BR /&gt;This is from Open SSL: "A bug in OpenSSLs SSL/TLS protocol was also identified which causes OpenSSL to parse a client certificate from an SSL/TLS client when it should reject it as a protocol error."&lt;BR /&gt;&lt;BR /&gt;The deluge continues.  HP was pretty good about responding to the first one or two from a couple of weeks ago.  Any news from HP about the SSL problem?  Does it affect the latest Secure Shell release, and if so, when will it be fixed?&lt;BR /&gt;&lt;BR /&gt;Thanks!</description>
      <pubDate>Wed, 01 Oct 2003 17:43:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/another-ssh-bug-pam/m-p/3081872#M142851</guid>
      <dc:creator>jmb</dc:creator>
      <dc:date>2003-10-01T17:43:00Z</dc:date>
    </item>
  </channel>
</rss>

