Executive Summary

Summary
Title New version of inn2 released
Informations
Name DSA-023 First vendor Publication 2001-01-26
Vendor Debian Last vendor Modification 2001-01-26
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:N)
Cvss Base Score 4 Attack Range Network
Cvss Impact Score 4.9 Attack Complexity High
Cvss Expoit Score 4.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

1. People at WireX have found several potential insecure uses of temporary files in programs provided by INN2. Some of them only lead to a vulnerability to symlink attacks if the temporary directory was set to /tmp or /var/tmp, which is the case in many installations, at least in Debian packages. An attacker could overwrite any file owned by the news system administrator, i.e. owned by news.news.

2. Michal Zalewski found an exploitable buffer overflow with regard to cancel messages and their verification. This bug did only show up if "verifycancels" was enabled in inn.conf which is not the default and has been disrecommended by upstream.

3. Andi Kleen found a bug in INN2 that makes innd crash for two byte headers. There is a chance this can only be exploited with uucp.

We recommend you upgrade your inn2 packages immediately.

wget url will fetch the file for you dpkg -i file.deb will install the referenced file.

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 2.2 alias potato

Original Source

Url : http://www.debian.org/security/2001/dsa-023

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-310 Cryptographic Issues

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:5729
 
Oval ID: oval:org.mitre.oval:def:5729
Title: Multiple Vendor SSH 1.5 Session Key Recovery Vulnerability
Description: Implementations of SSH version 1.5, including (1) OpenSSH up to version 2.3.0, (2) AppGate, and (3) ssh-1 up to version 1.2.31, in certain configurations, allow a remote attacker to decrypt and/or alter traffic via a "Bleichenbacher attack" on PKCS#1 version 1.5.
Family: ios Class: vulnerability
Reference(s): CVE-2001-0361
Version: 1
Platform(s): Cisco IOS
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 3
Application 33

OpenVAS Exploits

Date Description
2008-01-17 Name : Debian Security Advisory DSA 023-1 (inn2)
File : nvt/deb_023_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 086-1 (ssh-nonfree, ssh-socks)
File : nvt/deb_086_1.nasl
2005-11-03 Name : PKCS 1 Version 1.5 Session Key Retrieval
File : nvt/ssh_pkcs.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
2116 PKCS 1 Version 1.5 Session Key Retrieval (Bleichenbacher Attack)

Several protocols which implement the digital enveloping method, described in version 1.5 of the PKCS #1 standard, are susceptible to an adaptive ciphertext attack. This allows the recovery of session keys, thus compromising the integrity of the data transmitting during that session. The data encryption techniques described in RSA's PKCS #1 standard are used in many protocols which rely on, at least in part, the security provided by public-key cryptography systems.

Nessus® Vulnerability Scanner

Date Description
2011-10-04 Name : Remote attackers may be able to infer information about traffic inside an SSH...
File : openssh_252.nasl - Type : ACT_GATHER_INFO
2011-08-29 Name : The SSH service running on the remote host has an information disclosure vuln...
File : sunssh_plaintext_recovery.nasl - Type : ACT_GATHER_INFO
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-023.nasl - Type : ACT_GATHER_INFO
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-027.nasl - Type : ACT_GATHER_INFO
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-086.nasl - Type : ACT_GATHER_INFO
2002-06-05 Name : The remote network device is running an SSH server with multiple vulnerabilit...
File : cisco_ssh_multiple_vulns.nasl - Type : ACT_GATHER_INFO
2002-03-06 Name : The remote service offers an insecure cryptographic protocol.
File : ssh1_proto_enabled.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:25:19
  • Multiple Updates