Debian Security Advisory
sshd -- buffer overflow in logging
- Date Reported:
- 10 Dec 1998
- Affected Packages:
- ssh
- Vulnerable:
- Yes
- Security database references:
- No other external database security references currently available.
- More information:
-
There has been a lot of confusion over ssh lately: some people think
their systems have been hacked through ssh, although nobody has been
able to produce an exploit. To avoid any possible problems we have
patched ssh to fix any possible buffer overruns. We think this will
stop any attack that might be out there. This also includes the fixes
to the kerberos code that were distributed.
Please note that this patch does not suffer from the license problems that other patches that have circulated have, since it does not use the vsnprintf implementation from ssh 2 but instead uses the code from sendmail (which was based on code floating around on usenet) for systems that don't have vsnprintf in their libc.
We recommend you upgrade your ssh package immediately.
- Fixed in:
- All - (in release 2.1) ssh-1.2.26-1.2 All - (in release 2.1) ssh-askpass-1.2.26-1.2