⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 deb_134_1.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
# OpenVAS Vulnerability Test# $Id$# Description: Auto-generated from advisory DSA 134-1## Authors:# Thomas Reinke <reinke@securityspace.com>## Copyright:# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com# Text descriptions are largerly excerpted from the referenced# advisory, and are Copyright (c) the respective author(s)## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2,# as published by the Free Software Foundation## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.#if(description){ script_id(53850); script_version ("$"); name["english"] = "Debian Security Advisory DSA 134-1 (ssh)"; script_name(english:name["english"]); desc["english"] = "The remote host is missing an update to sshannounced via advisory DSA 134-1.Theo de Raadt announced that the OpenBSD team is working with ISSon a remote exploit for OpenSSH (a free implementation of theSecure SHell protocol). They are refusing to provide any details onthe vulnerability but instead are advising everyone to upgrade tothe latest release, version 3.3.This version was released 3 days ago and introduced a new featureto reduce the effect of exploits in the network handling codecalled privilege separation.  Unfortunately this release has a fewknown problems: compression does not work on all operating systemssince the code relies on specific mmap features, and the PAMsupport has not been completed. There may be other problems aswell.The new privilege separation support from Niels Provos changes sshto use a separate non-privileged process to handle most of thework. This means any vulnerability in this part of OpenSSH cannever lead to a root compromise but only to access to a separateaccount restricted to a chroot.Theo made it very clear this new version does not fix thevulnerability, instead by using the new privilege separation codeit merely reduces the risk since the attacker can only gain accessto a special account restricted in a chroot.Since details of the problem have not been released we were forcedto move to the latest release of OpenSSH portable, version 3.3p1.Due to the short time frame we have had we have not been able toupdate the ssh package for Debian GNU/Linux 2.2 / potato yet.Packages for the upcoming 3.0 release (woody) are available formost architectures.Please note that we have not had the time to do proper QA on thesepackages; they might contain bugs or break things unexpectedly. Ifyou notice any such problems please file a bug-report so we caninvestigate.This package introduce a new account called `sshd' that is used inthe privilege separation code. If no sshd account exists thepackage will try to create one. If the account already exists itwill be re-used. If you do not want this to happen you will haveto fix this manually.Solution:https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20134-1Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Debian Security Advisory DSA 134-1 (ssh)"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com"); family["english"] = "Debian Local Security Checks"; script_family(english:family["english"]); script_dependencies("gather-package-list.nasl"); script_require_keys("ssh/login/packages"); exit(0);}## The script code starts here#include("revisions-lib.inc");include("pkg-lib-deb.inc");vuln = 0;if(isdpkgvuln(pkg:"ssh", ver:"3.3p1-0.0woody1", rls:"DEB3.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"ssh-askpass-gnome", ver:"3.3p1-0.0woody1", rls:"DEB3.0")) {    vuln = 1;}if(vuln) {    security_hole(0);}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -