|
Message-ID: <55CB2EBC.706@redhat.com> Date: Wed, 12 Aug 2015 13:32:12 +0200 From: Adam Maris <amaris@...hat.com> To: oss-security@...ts.openwall.com Subject: Re: CVE request - OpenSSH 6.9 PAM privilege separation vulnerabilities On 12/08/15 10:39, Adam Maris wrote: > Could you assign CVEs for the other two issues as well? > > * sshd(8): fix circumvention of MaxAuthTries using keyboard- > interactive authentication. By specifying a long, repeating > keyboard-interactive "devices" string, an attacker could request > the same authentication method be tried thousands of times in > a single pass. The LoginGraceTime timeout in sshd(8) and any > authentication failure delays implemented by the authentication > mechanism itself were still applied. Found by Kingcope. > > * sshd(8): OpenSSH 6.8 and 6.9 incorrectly set TTYs to be world- > writable. Local attackers may be able to write arbitrary messages > to logged-in users, including terminal escape sequences. > Reported by Nikolay Edigaryev. > > Or have they CVEs already? > > Thanks. > Well, the first one (circumvention of MaxAuthTries) was already assigned CVE-2015-5600. Not sure about the second one. -- Adam Maris / Red Hat Product Security
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.