Moderate CentOS openssh Security Update

Metadata

high
7.5
openssh-5.3p1-117.el6.i686.rpm, openssh-5.3p1-117.el6.x86_64.rpm, openssh-askpass-5.3p1-117.el6.i686.rpm, openssh-askpass-5.3p1-117.el6.x86_64.rpm, openssh-clients-5.3p1-117.el6.i686.rpm, openssh-clients-5.3p1-117.el6.x86_64.rpm, openssh-ldap-5.3p1-117.el6.i686.rpm, openssh-ldap-5.3p1-117.el6.x86_64.rpm, openssh-server-5.3p1-117.el6.i686.rpm, openssh-server-5.3p1-117.el6.x86_64.rpm, pam_ssh_agent_auth-0.9.3-117.el6.i686.rpm, pam_ssh_agent_auth-0.9.3-117.el6.x86_64.rpm
CVE-2015-5352, CVE-2015-6563, CVE-2015-6564, CVE-2016-1908
rhn.redhat.com, lists.centos.org
2016-05-16
2017-07-27 19:11
ALAS-2016-675
ALAS-2015-625
ALAS-2015-592
ALAS-2015-568
Moderate CentOS openssh Security Update
Moderate CentOS openssh Security Update
CVE-2015-6563 openssh
CVE-2015-6564 openssh
CVE-2015-5352 openssh
CVE-2016-1908 openssh
CVE-2015-6564
CVE-2016-1908
CVE-2015-5352
CVE-2015-6563
2017-04-01 19:09
2017-01-05 20:14

Description


An update for openssh is now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.

Security Fix(es):

* It was found that the OpenSSH client did not properly enforce the ForwardX11Timeout setting. A malicious or compromised remote X application could possibly use this flaw to establish a trusted connection to the local X server, even if only untrusted X11 forwarding was requested. (CVE-2015-5352)

* A flaw was found in the way OpenSSH handled PAM authentication when using privilege separation. An attacker with valid credentials on the system and able to fully compromise a non-privileged pre-authentication process using a different flaw could use this flaw to authenticate as other users. (CVE-2015-6563)

* A use-after-free flaw was found in OpenSSH. An attacker able to fully compromise a non-privileged pre-authentication process using a different flaw could possibly cause sshd to crash or execute arbitrary code with root privileges. (CVE-2015-6564)

* An access flaw was discovered in OpenSSH; the OpenSSH client did not correctly handle failures to generate authentication cookies for untrusted X11 forwarding. A malicious or compromised remote X application could possibly use this flaw to establish a trusted connection to the local X server, even if only untrusted X11 forwarding was requested. (CVE-2016-1908)

For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.8 Release Notes and Red Hat Enterprise Linux 6.8 Technical Notes linked from the References section.
Please see https://www.redhat.com/footer/terms-of-use.html

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
6 openssh openssh-5.3p1-117.el6.i686.rpm
openssh openssh-5.3p1-117.el6.x86_64.rpm
openssh-askpass openssh-askpass-5.3p1-117.el6.i686.rpm
openssh-askpass openssh-askpass-5.3p1-117.el6.x86_64.rpm
openssh-clients openssh-clients-5.3p1-117.el6.i686.rpm
openssh-clients openssh-clients-5.3p1-117.el6.x86_64.rpm
openssh-ldap openssh-ldap-5.3p1-117.el6.i686.rpm
openssh-ldap openssh-ldap-5.3p1-117.el6.x86_64.rpm
openssh-server openssh-server-5.3p1-117.el6.i686.rpm
openssh-server openssh-server-5.3p1-117.el6.x86_64.rpm
pam_ssh_agent_auth pam_ssh_agent_auth-0.9.3-117.el6.i686.rpm
pam_ssh_agent_auth pam_ssh_agent_auth-0.9.3-117.el6.x86_64.rpm