1834872 Members
2160 Online
110070 Solutions
New Discussion

Re: Open ssh question.

 
brian_31
Super Advisor

Open ssh question.

Team:

How do i find if i have openssh on a given hp-ux 11 box? Also does anyone know of this alert?
http://www.cert.org/advisories/CA-2003-24.html

Thanks

Brian.
7 REPLIES 7
Steven E. Protter
Exalted Contributor

Re: Open ssh question.

HP has issued a security alert based on the cert notice you pushed.

They also rolled out their 3.6 binaries with a new version that supposedly plugs the security hole.

Check Berlene Herren's posts for more information.

swlist -l product | grep -i secure

This will list HP Secure Shell, which is what they call their port of openssh.

SEP
Steven E Protter
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
Steven E. Protter
Exalted Contributor

Re: Open ssh question.

Also the command

what /usr/bin/ssh

Will give you details on the version you have installed.

SEP
Steven E Protter
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
Jeff Schussele
Honored Contributor

Re: Open ssh question.

Hi Brian,

I use
swlist | grep -i ssh
to check whether it's installed & what ver.

We compile our own SSH here & upgraded to 3.7.1p1 last week as our solution to the CERT advisory.

Rgds,
Jeff
PERSEVERANCE -- Remember, whatever does not kill you only makes you stronger!
Steven Sim Kok Leong
Honored Contributor

Re: Open ssh question.

Here's the latest alert. ONLY 3.7.1p2 fixes this latest vulnerability. Alternatively, set UsePAM to no in sshd_config.

Steven Sim Kok Leong

Extract:
===============================================================
[Summary]:

A vulnerability has been discovered in OpenSSH which also affects the recent released versions 3.7p1 and 3.7.1p1. The new version 3.7.1p2 fixes additional relating issues in PAM module, not covered in 3.7.1p1.

[Description]:

A vulnerability was reported in two specific portable versions of OpenSSH in the PAM implementation. A remote user may be able to execute arbitrary code.

It is reported that there are multiple flaws in the new PAM code in portable OpenSSH versions 3.7p1 and 3.7.1p1. In at least one bug, a remote user can cause arbitrary code to be executed on the target system when the targat system is in a non-standard configuration (with privsep disabled).

The vendor notes that the OpenBSD releases of OpenSSH do not contain this code and, therefore, are not vulnerable. Also, portable OpenSSH versions prior to 3.6.1p2 are also not affected.

[Impact]:

A remote user may be able to execute arbitrary code on the target system wtih root privileges.

[Solution]:

The vendor has released a fixed version (3.7.1p2), available at:

http://www.openssh.org/portable.html
ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-3.7.1p2.tar.gz

As a workaround, the vendor reports that you can disable PAM support ("UsePam no" in sshd_config).

The vendor has also provided the following warning regarding use of PAM with OpenSSH:

"Due to complexity, inconsistencies in the specification and differences between vendors' PAM implementations we recommend that PAM be left disabled in sshd_config unless there is a need for its use.

Sites only using public key or simple password authentication usually have little need to enable PAM support."

Please note that this version contains the four *realloc() bug fixes that Solar Designer discovered in 3.7.1p1 and prior versions. However, the purpose of the 3.7.1p2 release is to correct the security flaws in the PAM code and not due to the Solar Designer bugs. As described in a previous alert, Solar Designer considers the *realloc() bugs to have no security impact.

[Reference]:
http://www.openssh.com/txt/sshpam.adv
http://isc.sans.org/diary.html?date=2003-09-16
===============================================================
Steven E. Protter
Exalted Contributor

Re: Open ssh question.

HP claims the latest 3.6 release fixes CA-2003-24 from CERT.

Berlene Herren has a post that indicates that. I'm inclined to trust HP on this one. As they say in my wifes home country, trust but verify.

SEP
Steven E Protter
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
Zeev Schultz
Honored Contributor

Re: Open ssh question.

http://www.openssh.com/txt/buffer.adv


Solution:
Upgrade to OpenSSH 3.7.1 or apply the following patch.

Appendix A: patch for OpenSSH 3.6.1 and earlier

From HP security advisory HPSBUX0309-282 :
------------------------------------------
Pursuant to the CERT Advisory CA-2003-24 on OpenSSH, Hewlett-Packard Company has learned of a defect in the code in SSH, product number T1471AA.


HP proposed fix:
------------------
HP has produced the following new depots which fix this defect for its version, which is based on OpenSSH release 3.6.2. Called A.03.61.002, it is the newest version of
HP-UX Secure Shell.
B.11.22 T1471AA_A.03.61.002_HP-UX_B.11.22_IA.depot
B.11.11 T1471AA_A.03.61.002_HP-UX_B.11.11_32+64.depot
B.11.00 T1471AA_A.03.61.002_HP-UX_B.11.00_32+64.depot
------------------


P.S - SEP - I'd say it's more like "Trust but check" from the mentioned (russian?) phrase :)
So computers don't think yet. At least not chess computers. - Seymour Cray
Steven Sim Kok Leong
Honored Contributor

Re: Open ssh question.

Hi,

Kindly check whether your "trust" is current. As Keev's extract has shown, the HP releases do not fix the latest ssh pam vulnerability.

Refer to:
http://www.openssh.com/txt/sshpam.adv

OpenSSH release version 3.7.1p2 fixes it. Doesn't seem that a HP equivalent patched version is released, yet.

Hope this helps. Regards.

Steven Sim Kok Leong