New FreeBSD, NetBSD Security Advisories 71
Dan writes "FreeBSD has formally announced a security advisory entitled "OpenSSH buffer management error" for the now famous OpenSSH advisory (OpenSSH has released a new version 3.7.1 to address this issue). NetBSD has issued a similar advisory and fix for this issue. NetBSD has released two additional security advisories entitled "Kernel memory disclosure via ibcs2" and "Insufficient argument checking in sysctl(2)"."
Patches vs. Fixes (Score:5, Interesting)
Re:Patches vs. Fixes (Score:4, Informative)
Re:Patches vs. Fixes (Score:4, Insightful)
If you ever take a look at the patched code for one of these security advisories, you mainly see some special case code stuck in there to patch up the problem.
If you ever take a look at the actual *problem*, you'll find that hey are usually just buffer overflows or other unchecked data, in which case 'some special case code' is the only appropriate course of action.
I'll tell you what's REAL BSD news (Score:5, Funny)
Hey give us trolls a chance (Score:3, Funny)
OS X (Score:5, Interesting)
Re:OS X (Score:5, Informative)
Check your system. In terminal type:
Re:OS X (Score:1)
Re:OS X (Score:1)
Just Remember (Score:2, Insightful)
Also remember (Score:2, Insightful)
There are security flaws in all software (maybe with the exception of Hello, World!), this has nothing to do with the availability of the source.
Re:deceit. (Score:5, Informative)
If you look carefully at the bug - at first glance, it lookls like when SSHD faluts out, some extra memory will be wiped with nulls.
Perhaps there's more to this but basically whats is going on
SSHD need more memory.
Memrory counter is added to.
Memeory is allocated.
Repeat (until memory allocation fails)
then...
Because SSHD needs to wipe all it's memory to null so no crpto stuff is left lying around, all the memory pointed to my them memory counter is wiped. But unfortunalty some of that memory doesen't belong to SSHD because the memory allocation failed.
Re:deceit. (Score:3, Insightful)
-sirket
Re:deceit. (Score:1, Insightful)
But if someone can just crash it remotely without even getting to a shell it's not a hole? That doesn't makes sense to me.
I run OpenBSD on a home made firewall at home and I love it as much as the next guy, but I don't see how this can't be considered a hole.
Re:deceit. (Score:3, Interesting)
The difference is that if they could get even a very limited shell, that would turn all the local exploit bugs into potential remote exploit holes. That is clearly an order of magnitude more dangerous than a simple DOS.
So, I think it makes sense to distinguish between the two cases, though I think just talking about `holes' is silly. Didn't they used to have `remote root exploit
Re:deceit. (Score:1)
Re:deceit. (Score:1)
hey darren (Score:1, Troll)
seen the code to the exploit? i have. there is no exploit. funny that. it's a local system trojan. it doesn't do *ANYTHING* to sshd. it mails the ip and master.passwd to an email address. big fucking do.
if you followed misc@, you'd know that too.
So what? (Score:2, Informative)
Phil
Re:So what? (Score:3, Insightful)
If there is a way for third parties to disable a service running on my computer, yes I would like to be informed by it
linux sucks donkey dick (Score:1)
Of course, it installed sshd in /usr/local/sbin... sshd 2.9 (i think) was still located in /usr/sbin.
Re:linux sucks donkey dick (Score:1)
OPENSSH_OVERWRITE_BASE= true
in your
Re:linux sucks donkey dick (Score:2)
Make that
Re:linux sucks donkey dick (Score:2)
No biggie... just disable the default invocation and rename the sshd.sh.example script in the above directory to sshd.sh.
What *I* found a little confusing is that everything I read stated I should be using 3.7.1, but they're providing a patched version of 3.6.1. 8/
Actual Question... (Score:2)
for FreeBSD 4.8 (Score:2)
make
make install
use ps -aux to find the ##### of the process of sshd.
kill -HUP #####
Anyone who reboots to accomplish this upgrade shouldn't be a sysadmin. Have fun!
Re:for FreeBSD 4.8 (Score:5, Funny)
Re:for FreeBSD 4.8 (Score:2)
--prefix=/opt
with whatever is appropriate for your setup. Do a which sshd to find out where your sshd has been installed. What I ended up using on my FreeBSD 4.8 box was actually --prefix=/usr
Last but not least, if you've done much lock-down or modifications to your sshd_conf, you'd actually
Re:for FreeBSD 4.8 (Score:2)
I think he is refering to the kill -HUP #####
Which will send the currently running ssh daemon the hangup signal, instructing it to re-read its configuration.
I think it is you who will be doing the confusing.
Anyone who reboots to accomplish this upgrade shouldn't be a sysadmin.
What an absolutely absurd statement. I bet you've just recently figured that you can upgrade a daemon without rebooting, so anyone who upgrades
Re:for FreeBSD 4.8 (Score:2)
Since processes decide themselves what they should do with a hangup signal, in this case I am wrong...
http://www.openbsd.org/cgi-bin/man.cgi?query=sshd [openbsd.org]
Your attitude still needs some adjustment though.
stop this (Score:2)
Dan, please don't do it! Please! It looks really bad.
Copy/Paste Trolls (Score:2)