Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 12 Aug 2015 13:32:12 +0200
From: Adam Maris <amaris@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request - OpenSSH 6.9 PAM privilege separation
 vulnerabilities



On 12/08/15 10:39, Adam Maris wrote:
> Could you assign CVEs for the other two issues as well?
>
>  * sshd(8): fix circumvention of MaxAuthTries using keyboard-
>    interactive authentication. By specifying a long, repeating
>    keyboard-interactive "devices" string, an attacker could request
>    the same authentication method be tried thousands of times in
>    a single pass. The LoginGraceTime timeout in sshd(8) and any
>    authentication failure delays implemented by the authentication
>    mechanism itself were still applied. Found by Kingcope.
>
>  * sshd(8): OpenSSH 6.8 and 6.9 incorrectly set TTYs to be world-
>    writable. Local attackers may be able to write arbitrary messages
>    to logged-in users, including terminal escape sequences.
>    Reported by Nikolay Edigaryev.
>
> Or have they CVEs already?
>
> Thanks.
>
Well, the first one (circumvention of MaxAuthTries) was already assigned 
CVE-2015-5600.
Not sure about the second one.

-- 
Adam Maris / Red Hat Product Security

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.