SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (VPN)  >   OpenSSH Vendors:   OpenSSH.org
(Oracle Issues Fix for Oracle Linux) OpenSSH X11 Authentication Credentials Input Validation Flaw Lets Remote Authenticated Users Inject xauth Commands on the Target System
SecurityTracker Alert ID:  1035351
SecurityTracker URL:  http://securitytracker.com/id/1035351
CVE Reference:   CVE-2016-3115   (Links to External Site)
Date:  Mar 22 2016
Impact:   Disclosure of user information, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 7.2p2
Description:   A vulnerability was reported in OpenSSH. A remote authenticated user can inject xauth commands.

The sshd server does not properly validate user-supplied X11 authentication credentials when establishing an X11 forwarding session before supplying the credentials to xauth. A remote authenticated user can send specially crafted X11 credential data to inject xauth commands. The commands will run with the user's own privileges but can be exploited to, for example, read or overwrite files, connect to local ports, or perform other attacks against xauth.

Systems with X11Forwarding enabled are affected.

github.com/tintinweb reported this vulnerability.

Impact:   A remote authenticated user can inject arbitrary xauth commands to, for example, read or overwrite files, connect to local ports, or perform other attacks against xauth.
Solution:   Oracle has issued a fix.

The Oracle Linux advisory is available at:

http://linux.oracle.com/errata/ELSA-2016-0466.html

Vendor URL:  linux.oracle.com/errata/ELSA-2016-0466.html (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Oracle)
Underlying OS Comments:  6

Message History:   This archive entry is a follow-up to the message listed below.
Mar 10 2016 OpenSSH X11 Authentication Credentials Input Validation Flaw Lets Remote Authenticated Users Inject xauth Commands on the Target System



 Source Message Contents

Subject:  [El-errata] ELSA-2016-0466 Moderate: Oracle Linux 6 openssh security update

Oracle Linux Security Advisory ELSA-2016-0466

http://linux.oracle.com/errata/ELSA-2016-0466.html

The following updated rpms for Oracle Linux 6 have been uploaded to the 
Unbreakable Linux Network:

i386:
openssh-5.3p1-114.el6_7.i686.rpm
openssh-askpass-5.3p1-114.el6_7.i686.rpm
openssh-clients-5.3p1-114.el6_7.i686.rpm
openssh-ldap-5.3p1-114.el6_7.i686.rpm
openssh-server-5.3p1-114.el6_7.i686.rpm
pam_ssh_agent_auth-0.9.3-114.el6_7.i686.rpm

x86_64:
openssh-5.3p1-114.el6_7.x86_64.rpm
openssh-askpass-5.3p1-114.el6_7.x86_64.rpm
openssh-clients-5.3p1-114.el6_7.x86_64.rpm
openssh-ldap-5.3p1-114.el6_7.x86_64.rpm
openssh-server-5.3p1-114.el6_7.x86_64.rpm
pam_ssh_agent_auth-0.9.3-114.el6_7.i686.rpm
pam_ssh_agent_auth-0.9.3-114.el6_7.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/openssh-5.3p1-114.el6_7.src.rpm



Description of changes:

[5.3p1-114]
- CVE-2015-5600: MaxAuthTries limit bypass via duplicates in 
KbdInteractiveDevices (#1245969)

[5.3p1-113]
- CVE-2016-3115: missing sanitisation of input for X11 forwarding (#1317816)


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC