[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: [SECURITY] [DSA 1379-2] New openssl packages fix arbitrary code execution



Am Mittwoch, 10. Oktober 2007 19:59 schrieb Noah Meyerhans:
> ------------------------------------------------------------------------
> Debian Security Advisory DSA-1379-2                security@debian.org
> http://www.debian.org/security/                         Noah Meyerhans
> October 10, 2007
> ------------------------------------------------------------------------
>
> Package        : openssl097, openssl096
> Vulnerability  : off-by-one error/buffer overflow
> Problem type   : remote
> Debian-specific: no
> CVE Id(s)      : CVE-2007-5135
> Debian Bug     : 444435
>
> An off-by-one error has been identified in the SSL_get_shared_ciphers()
> routine in OpenSSL, an implementation of Secure Socket Layer
> cryptographic libraries and utilities.  This error could allow an
> attacker to crash an application making use of OpenSSL's libssl library,
> or potentially execute arbitrary code in the security context of the
> user running such an application.
>
> This update to DSA 1379 announces the availability of the libssl0.9.6
> and libssl0.9.7 compatibility libraries for sarge (oldstable) and etch
> (stable), respectively.
>
> We recommend that you upgrade your openssl097 and openssl096 packages.

Hello,

I didn’t update my OpenSSL packages until now since I assumed that OpenSSL is 
not used on my machine.  I was surprised that during updating OpenSSL, it was 
suggested to restart SSH since SSH was said to be dependent on OpenSSL.  In 
what way does SSH depend on OpenSSL?  Under which circumstances do the 
security holes of OpenSSL cause security issues with SSH?

Thank you for any help.

Best regards,
Wolfgang Jeltsch



Reply to: