|
Message-ID: <20160115014642.GE16572@netmeister.org> Date: Thu, 14 Jan 2016 20:46:42 -0500 From: Jan Schaumann <jschauma@...meister.org> To: Qualys Security Advisory <qsa@...lys.com> Cc: oss-security@...ts.openwall.com Subject: Re: Qualys Security Advisory - Roaming through the OpenSSH client: CVE-2016-0777 and CVE-2016-0778 Qualys Security Advisory <qsa@...lys.com> wrote: > On Thu, Jan 14, 2016 at 01:11:29PM -0500, Jan Schaumann wrote: > > Why is version 5.3 not affected? > > The information leak is in resend_bytes() ["if (out_start < out_last)" > should be "if (out_start <= out_last)"], but in OpenSSH 5.3, there is no > call to resend_bytes(), at all (roaming_client.c does not even exist). Thanks. I see resend_bytes() being added on 2009-06-27 in roaming_common.c: https://github.com/openssh/openssh-portable/commit/466df219615d72e48ff9103ec67521447f23a158 "2009/06/27 09:32:43 [roaming_common.c roaming.h] It may be necessary to retransmit some data when resuming, so add it to a buffer when roaming is enabled. " That's three days before the version was bumped to 5.3. I'm afraid I haven't had the time to test your PoC against 5.3, but I just want to make sure that we're not overlooking a vulnerable version. -Jan
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.