Multiple Remote Denial of Service Vulnerabilities in OpenSSH
Release date:
Updated on:
Affected Systems:
OpenSSL Project OpenSSL <= 5.8
Description:
--------------------------------------------------------------------------------
Bugtraq id: 68757
CVE (CAN) ID: CVE-2010-4755
OpenSSH is an open-source implementation of the SSH protocol.
OpenSSH 5.8 and earlier versions, sftp. c's process_put function and sftp-glob.c's remote_glob function have a security vulnerability that allows authenticated remote users to use a specially crafted glob expression that does not match any path name.
OpenSSL TLS heartbeat read remote information leakage (CVE-2014-0160)
Severe OpenSSL bug allows attackers to read 64 KB of memory, fixed in half an hour in Debian
OpenSSL "heartbleed" Security Vulnerability
Provides FTP + SSL/TLS authentication through OpenSSL and implements secure data transmission.
<* Source: Maksymilian Arciemowicz (max@jestsuper.pl)
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
OpenSSL Project
---------------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://cvsweb.netbsd.org/cgi-bin/cvsweb.cgi/src/crypto/dist/ssh/Attic/sftp-glob.c#rev1.13.12.1
Http://cvsweb.netbsd.org/cgi-bin/cvsweb.cgi/src/crypto/dist/ssh/Attic/sftp.c#rev1.21.6.1
OpenSSL details: click here
OpenSSL: click here
This article permanently updates the link address: