int(1553)

Vulnerability Bulletins


Denegación de servicio en lsh

Vulnerability classification

Property Value
Confidence level Oficial
Impact Denegación de Servicio
Dificulty Experto
Required attacker level Acceso remoto sin cuenta a un servicio estandar

System information

Property Value
Affected manufacturer GNU/Linux
Affected software lsh

Description

Se ha descubierto una vulnerabilidad en lshd, un servidor SSH v2.

La explotación de esta vulnerabilidad podría permitir a un atacante remoto provocar una situación de denegación de servicio del servidor lshd.

Solution



Actualización de software

Debian Linux

Debian Linux 3.0
Source
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_1.2.5-2woody3.dsc
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_1.2.5-2woody3.diff.gz
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_1.2.5.orig.tar.gz
Architecture independent
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils-doc_1.2.5-2woody3_all.deb
Alpha
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_1.2.5-2woody3_alpha.deb
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_1.2.5-2woody3_alpha.deb
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_1.2.5-2woody3_alpha.deb
ARM
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_1.2.5-2woody3_arm.deb
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_1.2.5-2woody3_arm.deb
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_1.2.5-2woody3_arm.deb
Intel IA-32
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_1.2.5-2woody3_i386.deb
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_1.2.5-2woody3_i386.deb
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_1.2.5-2woody3_i386.deb
HP Precision
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_1.2.5-2woody3_hppa.deb
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_1.2.5-2woody3_hppa.deb
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_1.2.5-2woody3_hppa.deb
Motorola 680x0
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_1.2.5-2woody3_m68k.deb
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_1.2.5-2woody3_m68k.deb
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_1.2.5-2woody3_m68k.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_1.2.5-2woody3_mips.deb
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_1.2.5-2woody3_mips.deb
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_1.2.5-2woody3_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_1.2.5-2woody3_mipsel.deb
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_1.2.5-2woody3_mipsel.deb
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_1.2.5-2woody3_mipsel.deb
PowerPC
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_1.2.5-2woody3_powerpc.deb
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_1.2.5-2woody3_powerpc.deb
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_1.2.5-2woody3_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_1.2.5-2woody3_s390.deb
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_1.2.5-2woody3_s390.deb
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_1.2.5-2woody3_s390.deb
Sun Sparc
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-client_1.2.5-2woody3_sparc.deb
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-server_1.2.5-2woody3_sparc.deb
http://security.debian.org/pool/updates/main/l/lsh-utils/lsh-utils_1.2.5-2woody3_sparc.deb

Standar resources

Property Value
CVE CAN-2005-0814
BID

Other resources

Debian Security Advisory DSA 717-1
http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00099.html

Version history

Version Comments Date
1.0 Aviso emitido 2005-04-28
Ministerio de Defensa
CNI
CCN
CCN-CERT