Qualys Security Advisory - OpenSSH Overflow / Leak

Discussion in 'News Aggregator' started by Packet Storm, 15 Jan 2016.

  1. Packet Storm

    Packet Storm Guest

    Since version 5.4 (released on March 8, 2010), the OpenSSH client supports an undocumented feature called roaming: if the connection to an SSH server breaks unexpectedly, and if the server supports roaming as well, the client is able to reconnect to the server and resume the suspended SSH session. Although roaming is not supported by the OpenSSH server, it is enabled by default in the OpenSSH client, and contains two vulnerabilities that can be exploited by a malicious SSH server (or a trusted but compromised server): an information leak (memory disclosure), and a buffer overflow (heap-based).

    Continue reading...
     

Share This Page

Loading...