|
![]() |
| |
Vulnerability Note VU#945216SSH CRC32 attack detection code contains remote integer overflowOverviewThere is a remote integer overflow vulnerability in several implementations of the SSH1 protocol that allows an attacker to execute arbitrary code with the privileges of the SSH daemon, typically root.I. DescriptionThere is a remote integer overflow vulnerability in several implementations of the SSH1 protocol. This vulnerability is located in a segment of code that was introduced to defend against exploitation of CRC32 weaknesses in the SSH1 protocol (see VU#13877). The attack detection function (detect_attack, located in deattack.c) makes use of a dynamically allocated hash table to store connection information that is then examined to detect and respond to CRC32 attacks. By sending a crafted SSH1 packet to an affected host, an attacker can cause the SSH daemon to create a hash table with a size of zero. When the detection function then attempts to hash values into the null-sized hash table, these values can be used to modify the return address of the function call, thus causing the program to execute arbitrary code with the privileges of the SSH daemon, typically root.II. ImpactThis vulnerability allows a remote attacker to execute arbitrary code with the privileges of the SSH daemon, typically root.III. SolutionApply a patch from your vendor
ReferencesVU#13877 http://razor.bindview.com/publish/advisories/adv_ssh1crc.html http://www.cert.org/advisories/CA-2001-35.html http://www.core-sdi.com/pressroom/advisories_desplegado.php?idx=81&idxsection=10# http://www.f-secure.com/support/ssh/ http://www.kb.cert.org/vuls/id/13877 http://www.openssh.com/security.html http://www.para-protect.com/Advisories/Guests/2001/20010627_1540_ORVEA01.pdf http://www.securityfocus.com/bid/2347 http://www.ssh.com/products/ssh/advisories/ssh1_crc-32.cfm http://xforce.iss.net/static/6083.php http://xforce.iss.net/alerts/advise100.php CreditThis vulnerability was discovered by Michal Zalewski of the BindView RAZOR Team. The CERT/CC thanks both the BindView RAZOR Team and CORE-SDI for their respective analyses of this vulnerability. This document was written by Jeffrey P. Lanza.
If you have feedback, comments, or additional information about this
vulnerability, please send us email. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||