728x90
OpenSSH 인증우회
명칭 : OpenSSH 인증우회
발령일시 : 4월11일
해당시스템 : 6.6
위험도 : ★★★☆☆
최초 보고자 : USN-2164-1
OpenSSH vulnerability
==========================================================================
Ubuntu Security Notice USN-2164-1
April 07, 2014
openssh vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.10
- Ubuntu 12.10
- Ubuntu 12.04 LTS
Summary:
A malicious server could bypass OpenSSH SSHFP DNS record checking.
Software Description:
- openssh: secure shell (SSH) for secure access to remote machines
Details:
Matthew Vernon discovered that OpenSSH did not correctly check SSHFP DNS
records if a server presented an unacceptable host certificate. A malicious
server could use this issue to disable SSHFP checking.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.10:
openssh-client 1:6.2p2-6ubuntu0.3
Ubuntu 12.10:
openssh-client 1:6.0p1-3ubuntu1.2
Ubuntu 12.04 LTS:
openssh-client 1:5.9p1-5ubuntu1.3
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2164-1
CVE-2014-2653
Package Information:
https://launchpad.net/ubuntu/+source/openssh/1:6.2p2-6ubuntu0.3
https://launchpad.net/ubuntu/+source/openssh/1:6.0p1-3ubuntu1.2
https://launchpad.net/ubuntu/+source/openssh/1:5.9p1-5ubuntu1.3
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
명칭 : OpenSSH 인증우회
발령일시 : 4월11일
해당시스템 : 6.6
위험도 : ★★★☆☆
최초 보고자 : USN-2164-1
OpenSSH vulnerability
==========================================================================
Ubuntu Security Notice USN-2164-1
April 07, 2014
openssh vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.10
- Ubuntu 12.10
- Ubuntu 12.04 LTS
Summary:
A malicious server could bypass OpenSSH SSHFP DNS record checking.
Software Description:
- openssh: secure shell (SSH) for secure access to remote machines
Details:
Matthew Vernon discovered that OpenSSH did not correctly check SSHFP DNS
records if a server presented an unacceptable host certificate. A malicious
server could use this issue to disable SSHFP checking.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.10:
openssh-client 1:6.2p2-6ubuntu0.3
Ubuntu 12.10:
openssh-client 1:6.0p1-3ubuntu1.2
Ubuntu 12.04 LTS:
openssh-client 1:5.9p1-5ubuntu1.3
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2164-1
CVE-2014-2653
Package Information:
https://launchpad.net/ubuntu/+source/openssh/1:6.2p2-6ubuntu0.3
https://launchpad.net/ubuntu/+source/openssh/1:6.0p1-3ubuntu1.2
https://launchpad.net/ubuntu/+source/openssh/1:5.9p1-5ubuntu1.3
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
728x90
'취약점 정보1' 카테고리의 다른 글
2014-04-15 취약점 정리 (0) | 2014.04.15 |
---|---|
OpenSSL 취약점(HeartBleed) 대응 방안 권고 (0) | 2014.04.15 |
openswan 취약점 (0) | 2014.04.14 |
리버스 허트브레드 테스팅 (0) | 2014.04.14 |
2014-04-14 취약점 정리 (0) | 2014.04.14 |