Minggu, 17 Januari 2016

Announce: OpenSSH Vulnerable Leaks Private Crypto Keys to Hacker

source thehackernews
OpenSSH 7.1p2 has been released on 14 january 2016, but has found and fixed bug OpenSSH this bug allows exploited by hackers to force client to leak their secret private cryptographic keys thereby potentialy exposing users to Man-In-The-Middle (MITM) attacks.

Why Cause Flow happen?

 




However, The roaming feature contains two different vulnerabilities:
  • An information sharing flaw (CVE-2016-0777)
  • A less harmless buffer overflow flaw (CVE-2016-0778)
The vulnerability does not have any catchy name like some previous OpenSSH flaws.

Impact of the Vulnerability

 

This new feature can be exploited by hackers, who could use a malicious OpenSSH server to trick an affected client to give up the SSH keys when they try to log in.
Cyber crooks with one compromised server can secretly grab SSH private keys required to log into other systems from a user's PC, allowing them to jump from server to server.









source thehackernews

Or Can Edited From Source Code For Disabling Roaming


Disabling Roaming in the Source Code:
=====================================

--- readconf.c 30 Jul 2015 00:01:34 -0000 1.239
+++ readconf.c 13 Jan 2016 23:17:23 -0000
@@ -1648,7 +1648,7 @@ initialize_options(Options * options)
options->tun_remote = -1;
options->local_command = NULL;
options->permit_local_command = -1;
- options->use_roaming = -1;
+ options->use_roaming = 0;
options->visual_host_key = -1;
options->ip_qos_interactive = -1;
options->ip_qos_bulk = -1;
@@ -1819,8 +1819,7 @@ fill_default_options(Options * options)
options->tun_remote = SSH_TUNID_ANY;
if (options->permit_local_command == -1)
options->permit_local_command = 0;
- if (options->use_roaming == -1)
- options->use_roaming = 1;
+ options->use_roaming = 0;
if (options->visual_host_key == -1)
options->visual_host_key = 0;
if (options->ip_qos_interactive == -1)
--- ssh.c 30 Jul 2015 00:01:34 -0000 1.420
+++ ssh.c 13 Jan 2016 23:17:23 -0000
@@ -1882,9 +1882,6 @@ ssh_session2(void)
fork_postauth();
}

- if (options.use_roaming)
- request_roaming();
-
return client_loop(tty_flag, tty_flag ?
options.escape_char : SSH_ESCAPECHAR_NONE, id);
}
source lwn
May be it's some OpenSSH bug, that has fixed. On slackware has upgraded to latest version, but FreeBSD first time upgraded.

Happy Reading!!! Thanks

Tidak ada komentar:

Posting Komentar