MGASA-2016-0280

Source
https://advisories.mageia.org/MGASA-2016-0280.html
Import Source
https://advisories.mageia.org/MGASA-2016-0280.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2016-0280
Related
Published
2016-08-31T15:32:33Z
Modified
2016-08-31T15:18:09Z
Summary
Updated openssh packages fix security vulnerability
Details

The dosetupenv function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pamenvironment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LDPRELOAD environment variable (CVE-2015-8325).

When SSHD tries to authenticate a non-existing user, it will pick up a fake password structure hard-coded in the SSHD source code. An attacker can measure timing information to determine if a user exists when verifying a password (CVE-2016-6210).

The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string (CVE-2016-6515).

Note that CVE-2015-8325 and CVE-2016-6210 wouldn't affect most Mageia systems, as UseLogin is not enabled by default and Mageia uses Blowfish password hashes by default.

References
Credits

Affected packages

Mageia:5 / openssh

Package

Name
openssh
Purl
pkg:rpm/mageia/openssh?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6p1-5.9.mga5

Ecosystem specific

{
    "section": "core"
}