Executive Summary

Summary
Title New lsh-utils packages fix local vulnerabilities
Informations
Name DSA-956 First vendor Publication 2006-01-26
Vendor Debian Last vendor Modification 2006-01-26
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:P/I:N/A:P)
Cvss Base Score 3.6 Attack Range Local
Cvss Impact Score 4.9 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Stefan Pfetzing discovered that lshd, a Secure Shell v2 (SSH2) protocol server, leaks a couple of file descriptors, related to the randomness generator, to user shells which are started by lshd. A local attacker can truncate the server's seed file, which may prevent the server from starting, and with some more effort, maybe also crack session keys.

After applying this update, you should remove the server's seed file (/var/spool/lsh/yarrow-seed-file) and then regenerate it with "lsh-make-seed --server" as root.

For security reasons, lsh-make-seed really needs to be run from the console of the system you are running it on. If you run lsh-make-seed using a remote shell, the timing information lsh-make-seed uses for its random seed creation is likely to be screwed. If need be, you can generate the random seed on a different system than that which it will eventually be on, by installing the lsh-utils package and running "lsh-make-seed -o my-other-server-seed-file". You may then transfer the seed to the destination system as using a secure connection.

The old stable distribution (woody) may not be affected by this problem.

For the stable distribution (sarge) this problem has been fixed in version 2.0.1-3sarge1.

For the unstable distribution (sid) this problem has been fixed in version 2.0.1cdbs-4.

We recommend that you upgrade your lsh-server package.

Original Source

Url : http://www.debian.org/security/2006/dsa-956

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-200 Information Exposure

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

OpenVAS Exploits

Date Description
2008-01-17 Name : Debian Security Advisory DSA 956-1 (lsh-utils)
File : nvt/deb_956_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
22695 LSH lshd Seed-file File Descriptor Leak

LSH contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when LSH spawns a new shell for a user. This will leak file descriptors from the 'lshd' daemon to the new process, potentially allowing the user to obtain keying material from the random number generator seed file. This will result in a loss of confidentiality. In addition, the user could truncate that file, denying the 'lshd' daemon access to keying material, causing a Denial-of-Service condition.

Nessus® Vulnerability Scanner

Date Description
2006-10-14 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-956.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:34:51
  • Multiple Updates