Guardian Digital Inc. Information for VU#333628

OpenSSH contains buffer management errors

Status

Affected

Vendor Statement

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

+------------------------------------------------------------------------+
| Guardian Digital Security Advisory                  September 18, 2003 |
|
http://www.guardiandigital.com                        ESA-20030918-024 |
|                                                                        |
| Packages: openssh, openssh-clients, openssh-server                     |
| Summary:  additional buffer management bugs.                           |
+------------------------------------------------------------------------+

EnGarde Secure Linux is an enterprise class Linux platform engineered
to enable corporations to quickly and cost-effectively build a complete
and secure Internet presence while preventing Internet threats.


OVERVIEW
- --------

After the release of ESA-20030916-023, the OpenSSH team discovered more
buffer management bugs (fixed in OpenSSH 3.7.1) of the same type.


The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0695 to this issue.


Additionally, Solar Designer fixed additional bugs of this class.  His
fixes are included in this update.


The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0682 to this issue.


Guardian Digital products affected by this issue include:

EnGarde Secure Community v1.0.1
EnGarde Secure Community 2
EnGarde Secure Professional v1.1
EnGarde Secure Professional v1.2
EnGarde Secure Professional v1.5


It is recommended that all users apply this update as soon as possible.

SOLUTION
- --------

Guardian Digital Secure Network subscribers may automatically update
affected systems by accessing their account from within the Guardian
Digital WebTool.


To modify your GDSN account and contact preferences, please go to:

https://www.guardiandigital.com/account/

Below are MD5 sums for the updated EnGarde Secure Linux 1.0.1 packages:

Source Packages:

SRPMS/openssh-3.4p1-1.0.24.src.rpm
MD5 Sum: 99fe7fb778502a2052bf77820c98e75f


Binary Packages:

i386/openssh-3.4p1-1.0.24.i386.rpm
MD5 Sum: 47c27d82dedff376039757b982a64354


i386/openssh-clients-3.4p1-1.0.24.i386.rpm
MD5 Sum: 033b6c372912ead498da72e61b726af5


i386/openssh-server-3.4p1-1.0.24.i386.rpm
MD5 Sum: 9b9564ca3cbf8dd6f9a56fb19c2bbb7a


i686/openssh-3.4p1-1.0.24.i686.rpm
MD5 Sum: 62b9c11f36e8ce38221d5eb31bf5e7f3


i686/openssh-clients-3.4p1-1.0.24.i686.rpm
MD5 Sum: b3b382a4b4a5923b02f5eac7a1d35290


i686/openssh-server-3.4p1-1.0.24.i686.rpm
MD5 Sum: 513893fc0ad8eda5ffdfc2f79c820e45


REFERENCES
- ----------

Guardian Digital's public key:
http://ftp.engardelinux.org/pub/engarde/ENGARDE-GPG-KEY

OpenSSH's Official Web Site:
http://www.openssh.com/

Guardian Digital Advisories:
http://infocenter.guardiandigital.com/advisories/

Security Contact: security@guardiandigital.com

- --------------------------------------------------------------------------
Author: Ryan W. Maple <ryan@guardiandigital.com>
Copyright 2003, Guardian Digital, Inc.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/acadHD5cqd57fu0RAm6kAJ9Mri+Rq56dr8cwm82tcyOLDcZQJACgjE+A
T+zQmXJeR4nmKZ4JfffjNyw=
=01Ez
-----END PGP SIGNATURE-----

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References

None

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.