Skip to content

Commit af1babf

Browse files
author
provos
committed
2.3.1 security note.
1 parent 964b4a1 commit af1babf

File tree

2 files changed

+52
-1
lines changed

2 files changed

+52
-1
lines changed

advisories/ssh_bypass.txt

Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
----------------------------------------------------------------------------
2+
3+
OpenBSD Security Advisory
4+
5+
February 8, 2001
6+
7+
Authentication By-Pass Vulnerability in OpenSSH-2.3.1
8+
9+
----------------------------------------------------------------------------
10+
11+
SYNOPSIS
12+
13+
OpenSSH-2.3.1, a development snapshot, only checked if a public key
14+
for public key authentication was permitted. In the protocol 2 part
15+
of the server, the challenge-response step that ensures that the
16+
connecting client is in possession of the corresponding private key
17+
has been omitted. As a result, anyone who could obtain the public key
18+
listed in the users authorized_keys file could log in as that user
19+
without authentication.
20+
21+
A fix for this problem was committed on Februrary 8th. The problem
22+
was introduced on January 18th. This is a three week time window.
23+
24+
----------------------------------------------------------------------------
25+
26+
AFFECTED SYSTEMS
27+
28+
This vulnerability affects only OpenSSH version 2.3.1 with support for
29+
protocol 2 enabled. The latest official release OpenSSH 2.3.0 is not
30+
affected by this problem. The latest snapshot version OpenSSH 2.3.2
31+
is not affected either.
32+
33+
----------------------------------------------------------------------------
34+
35+
RESOLUTION
36+
37+
If you installed the OpenSSH 2.3.1 development snapshot, install the
38+
latest snapshot. Currently, the latest snapshot is OpenSSH 2.3.2 which
39+
is available via http://www.openssh.com/.
40+
41+
----------------------------------------------------------------------------

openssh/security.html

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,13 +77,23 @@ <h2><font color=#e00000>Security</font><hr></h2>
7777
lead to remote root access. This problem has been fixed in
7878
OpenSSH 2.3.0. However, versions prior to 2.3.0 are vulnerable.
7979

80+
</dl>
81+
<p>
82+
<li>OpenSSH 2.3.1, a development snapshot, is vulnerable to
83+
"Feb 8, 2001: Authentication By-Pass Vulnerability in OpenSSH-2.3.1",
84+
<a href="http://www.openbsd.org/advisories/ssh_bypass.txt">OpenBSD Security Advisory</a>.
85+
In protocol 2, authentication could be bypassed if public key
86+
authentication was permitted. This problem does exist only
87+
in OpenSSH 2.3.1. OpenSSH 2.3.0 and versions newer than 2.3.1
88+
are not vulnerable to this problem.
89+
8090
</dl>
8191

8292
<hr>
8393
<a href=index.html><img height=24 width=24 src=back.gif border=0 alt=OpenSSH></a>
8494
8595
<br>
86-
<small>$OpenBSD: security.html,v 1.10 2001/02/08 23:49:04 provos Exp $</small>
96+
<small>$OpenBSD: security.html,v 1.11 2001/02/09 04:24:03 provos Exp $</small>
8797

8898
</body>
8999
</html>

0 commit comments

Comments
 (0)