OpenSSH 'BSD_AUTH' Access Control Bug May Allow Unauthorized Remote Users to Authenticated to the System
SecurityTracker Alert ID: 1004391|
SecurityTracker URL: http://securitytracker.com/id/1004391
(Links to External Site)
Date: May 28 2002
User access via network|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): 3.2.2 and prior versions|
A vulnerability was reported in OpenSSH when run on OpenBSD and BSD/OS operating systems. A remote user that should be denied access may be able to successfully authenticate to the system, or an authorized remote user may be denied access to the system.|
OpenSSH reported that there is a defect in the BSD_AUTH access control handling for OpenBSD and BSD/OS systems.
According to the report, systems using YP with netgroups in the password database may fail to use the proper password when verifying passwords under certain conditions. The SSH daemon may perform access control list checks for the requested user name but using the password database entry of a different user for authentication. As a result, a user that should be denied access may be able to authenticate successfully while a valid remote user may be denied access.
[Editor's note: The report only mentions OpenBSD and BSD/OS as affected operating systems and does not indicate if any other BSD-based operating systems are affected; we have marked this alert as potentially affecting other BSD-based systems just to be safe, even though that has not been confirmed.]
A remote user that is to be denied access by the SSH access control lists may be able to gain access to the system using the password of another user. Also, valide remote users may be incorrectly denied access.|
The vendor has issued a fixed version (3.2.3), available at:|
Vendor URL: www.openssh.org/ (Links to External Site)
|Underlying OS: UNIX (BSD/OS), UNIX (FreeBSD), UNIX (NetBSD), UNIX (OpenBSD), UNIX (macOS/OS X)|
|Underlying OS Comments: Affects BSD-based operating systems|
Source Message Contents
Subject: OpenSSH 3.2.3 released (fwd)|
---------- Forwarded message ----------
Date: Thu, 23 May 2002 10:08:08 +0200
From: Markus Friedl <Markus_Friedl@genua.de>
Subject: OpenSSH 3.2.3 released
OpenSSH 3.2.3 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We would like to thank the OpenSSH community for their continued
support and encouragement.
Changes since OpenSSH 3.2.2:
This release fixes several problems in OpenSSH 3.2.2:
- a defect in the BSD_AUTH access control handling for
OpenBSD and BSD/OS systems:
Under certain conditions, on systems using YP with netgroups
in the password database, it is possible that sshd does ACL
checks for the requested user name but uses the password
database entry of a different user for authentication. This
means that denied users might authenticate successfully while
permitted users could be locked out (OpenBSD PR 2659).
- login/tty problems on Solaris (bug #245)
- build problems on Cygwin systems
Changes between OpenSSH 3.1 and OpenSSH 3.2.2:
- fixed buffer overflow in Kerberos/AFS token passing
- fixed overflow in Kerberos client code
- sshd no longer auto-enables Kerberos/AFS
- experimental support for privilege separation,
see UsePrivilegeSeparation in sshd(8) and
for more information.
- only accept RSA keys of size SSH_RSA_MINIMUM_MODULUS_SIZE (768) or larger
- improved smartcard support (including support for OpenSC,
- improved Kerberos support (including support for MIT-Kerberos V)
- fixed stderr handling in protocol v2
- client reports failure if -R style TCP forwarding fails in protocol v2
- support configuration of TCP forwarding during interactive sessions (~C)
- improved support for older sftp servers
- improved support for importing old DSA keys (from ssh.com software).
- client side suport for PASSWD_CHANGEREQ in protocol v2
- fixed waitpid race conditions
- record correct lastlogin time
- please read http://www.openssh.com/report.html
OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de Raadt,
Kevin Steves, Damien Miller and Ben Lindstrom.