Debian Security Advisory

openssh -- possible remote exploit

Date Reported:
18 Nov 2000
Affected Packages:
ssh, ssh-askpass-gnome
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2000-1169.
More information:
The adv.fwd security advisory from OpenBSD reported a problem with openssh that Jacob Langseth <jwl@pobox.com> found: when the connection is established the remote ssh server can force the ssh client to enable agent and X11 forwarding.

This has been fixed in version 1.2.3-9.1 and we recommend that you upgrade your openssh packages immediately.

Fixed in:

Debian 2.2 (potato)

Source:
http://security.debian.org/dists/stable/updates/main/source/openssh_1.2.3-9.1.diff.gz
http://security.debian.org/dists/stable/updates/main/source/openssh_1.2.3-9.1.dsc
http://security.debian.org/dists/stable/updates/main/source/openssh_1.2.3.orig.tar.gz
Architecture-independent component:
http://security.debian.org/dists/stable/updates/main/binary-all/ssh-askpass-ptk_1.2.3-9.1_all.deb
alpha:
http://security.debian.org/dists/stable/updates/main/binary-alpha/ssh-askpass-gnome_1.2.3-9.1_alpha.deb
http://security.debian.org/dists/stable/updates/main/binary-alpha/ssh_1.2.3-9.1_alpha.deb
arm:
http://security.debian.org/dists/stable/updates/main/binary-arm/ssh-askpass-gnome_1.2.3-9.1_arm.deb
http://security.debian.org/dists/stable/updates/main/binary-arm/ssh_1.2.3-9.1_arm.deb
i386:
http://security.debian.org/dists/stable/updates/main/binary-i386/ssh-askpass-gnome_1.2.3-9.1_i386.deb
http://security.debian.org/dists/stable/updates/main/binary-i386/ssh_1.2.3-9.1_i386.deb
m68k:
http://security.debian.org/dists/stable/updates/main/binary-m68k/ssh-askpass-gnome_1.2.3-9.1_m68k.deb
http://security.debian.org/dists/stable/updates/main/binary-m68k/ssh_1.2.3-9.1_m68k.deb
powerpc:
http://security.debian.org/dists/stable/updates/main/binary-powerpc/ssh-askpass-gnome_1.2.3-9.1_powerpc.deb
http://security.debian.org/dists/stable/updates/main/binary-powerpc/ssh_1.2.3-9.1_powerpc.deb