GreenLake Administration
- Community Home
- >
- Servers and Operating Systems
- >
- HPE ProLiant
- >
- Server Management - Systems Insight Manager
- >
- Critical OpenSSH 3.7p1 PAM authentication vulnerab...
Server Management - Systems Insight Manager
1849090
Members
8011
Online
104041
Solutions
Forums
Categories
Company
Local Language
back
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Forums
Discussions
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-27-2004 04:01 AM
07-27-2004 04:01 AM
Critical OpenSSH 3.7p1 PAM authentication vulnerability
Our vulnerability scanning software indicates a critical vulnerability on our managed Proliant servers:
Portable SSH OpenSSH < 3.7.1p2 port 22/tcp
Rule family: Gain root remotely | Scan rule type: non intrusive
Description:
You are running OpenSSH 3.7p1 or 3.7.1p1. These versions are vulnerable to a flaw in the way they handle PAM authentication and may allow an attacker to gain a shell on this host. *** Note that Nessus did not detect whether PAM is being enabled *** in the remote sshd or not, so this might be a false positive. Solution : Upgrade to OpenSSH 3.7.1p2 or disable PAM support in sshd_config
Question... Will it break anything to either disable PAM support in sshd_config("UsePam no" in sshd_config)?
http://www.openssh.com/txt/sshpam.adv
OR alternatively to upgrade OpenSSH ( possibly using Cygwin Setup v2.416, Cygwin DLL v1.5.5 and OpenSSH v3.7.1p2)?
http://tech.erdelynet.com/cygwin-sshd.html
Portable SSH OpenSSH < 3.7.1p2 port 22/tcp
Rule family: Gain root remotely | Scan rule type: non intrusive
Description:
You are running OpenSSH 3.7p1 or 3.7.1p1. These versions are vulnerable to a flaw in the way they handle PAM authentication and may allow an attacker to gain a shell on this host. *** Note that Nessus did not detect whether PAM is being enabled *** in the remote sshd or not, so this might be a false positive. Solution : Upgrade to OpenSSH 3.7.1p2 or disable PAM support in sshd_config
Question... Will it break anything to either disable PAM support in sshd_config("UsePam no" in sshd_config)?
http://www.openssh.com/txt/sshpam.adv
OR alternatively to upgrade OpenSSH ( possibly using Cygwin Setup v2.416, Cygwin DLL v1.5.5 and OpenSSH v3.7.1p2)?
http://tech.erdelynet.com/cygwin-sshd.html
2 REPLIES 2
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-29-2004 01:13 AM
07-29-2004 01:13 AM
Re: Critical OpenSSH 3.7p1 PAM authentication vulnerability
Insight Manager doesn't enable PAM by default or need it, so you can safely shut this off if it is on (of course, it might break something else.)
Dude, we've been totally misled by our album covers!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-29-2004 03:34 AM
07-29-2004 03:34 AM
Re: Critical OpenSSH 3.7p1 PAM authentication vulnerability
I did explicitly disable it, ("UsePam no" in sshd_config), after posting to satisfy our security staff, and haven't seen anything break, yet."
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
Company
Events and news
Customer resources
© Copyright 2026 Hewlett Packard Enterprise Development LP