A new version of OpenSSH is available, the new release of OpenSSH 7.0 fixes four security flaws and several other bugs. Update it!
A new version of OpenSSH is available, the new release of OpenSSH 7.0 fixes four security flaws and several other bugs.
Then new OpenSSH 7.0 fixes a use-after-free vulnerability and three other flaws, two of which only affect the version Portable OpenSSH.
One of the vulnerabilities patched in version 7.0, a fix for circumvention of MaxAuthTries using keyboard- interactive authentication, is an issue with the way OpenSSH handles some authentication requests.
“By specifying a long, repeating keyboard-interactive “devices” string, an attacker could request the same authentication method be tried thousands of times in a single pass. The LoginGraceTime timeout in sshd(8) and any authentication failure delays implemented by the authentication mechanism itself were still applied,” states the release notes.
One of the bugs in the Portable OpenSSH is a use-after-free that could be exploited by attackers to remote code execution.
“Fixed a use-after-free bugrelated to PAM support that was reachable by attackers who couldcompromise the pre-authentication process for remote codeexecution,” continues the advisory.
The other vulnerability that affects only the Portable OpenSSH could be also exploited to remote code execution.
“Fixed a privilege separation weakness related to PAM support. Attackers who could successfullycompromise the pre-authentication process for remote codeexecution and who had valid credentials on the host couldimpersonate other users,” the advisory says.
The maintainers of the OpenSSH project also announced that the next version of the software, the OpenSSH 7.1, would deprecate several old cipher suites and cryptographic algorithms because they are no longer secure.
The list of changes includes:
Refusing all RSA keys smaller than 1024 bits (the current minimum is 768 bits)
Several ciphers will be disabled by default: blowfish-cbc, cast128-cbc, all arcfour variants and the rijndael-cbc aliasesfor AES.
MD5-based HMAC algorithms will be disabled by default.
Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer.
Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US.
Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines.
Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.