FC3的ssh有安全漏洞,怎么办????

发布于 2022-10-03 01:30:31 字数 3954 浏览 13 评论 0

http://www.linuxquestions.org/questions/showthread.php?s=&threadid=306097&goto=nextoldest

竟然有这样的问题,如何办是好???

[ Fedora Core OpenSSL Exploit ]  ( post #1)

According to Linux Security, the OpenSSL that comes with Fedora Core is vulnerable to attacks by false SSL handshakes that will cause a DoS to your system.

The OpenSSL toolkit provides support for secure communications between machines. OpenSSL includes a certificate management tool and shared libraries which provide various cryptographic algorithms and protocols.

For those that don't know what DoS means, the acronymn stands for: Denial Of Service.
(Basically you get locked out from the Internet because your operating system can't handle what's coming in network wise.)

If you run rkhunter on your FC system you will see a report that indeed this is true.

freshmeat.net: Project details for Rootkit Hunter

This exploit effects OpenSSL 0.9.7a which you will see is the package that installs in RedHat's Fedora Project Core 3 release.

Risk factor : High  ( post #2)

If you look in http://download.fedora.redhat.com for the "update" directory for FC3, you will see not a version HIGHER than 0.9.7a but what you will see is the version that doesn't have the problem and that version is 0.9.6b.

http://www.securityspace.com/smysec...d.html?id=51126

http://www.remoteassessment.com/?op...mp;vulnid=12704

http://www.linuxsecurity.com/content/view/105849/110/

What's really strange about this issue is the fact that the alert came from RedHat over one year ago today and the problem are RedHat O/S releases. Those versions of RH were and still are:

Red Hat Desktop (v. 3)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux WS (v. 3)

The OpenSSL version from RH is also the same revision that RedHat put in their Fedora Project, Core 3 release. The alert goes on to state that RH users should run up2date immediately as this is a critical flaw and will allow servers and clients to be hacked with sensitive data stolen as a possible end result scenario. This effects all applications that use OpenSSL.

There should be a notice on the FC3 ISO download web page IMHO.....

quote:
--------------------------------------------------------------------------------
Test ID: 51126
Category: Red Hat Local Security Checks
Title: RedHat Security Advisory RHSA-2004:120
Summary: Redhat Security Advisory RHSA-2004:120

Description: The remote host is missing updates announced in advisory RHSA-2004:120.

The OpenSSL toolkit implements Secure Sockets Layer (SSL v2/v3), Transport Layer Security (TLS v1) protocols, and serves as a full-strength general purpose cryptography library.

Testing performed by the OpenSSL group using the Codenomicon TLS Test Tool uncovered a null-pointer assignment in the do_change_cipher_spec() function in OpenSSL 0.9.6c-0.9.6k and 0.9.7a-0.9.7c. A remote attacker could perform a carefully crafted SSL/TLS handshake against a server that uses the OpenSSL library in such a way as to cause OpenSSL to crash. Depending on the application this could lead to a denial of service. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0079 to this issue.......
--------------------------------------------------------------------------------

For the rest of the article click this link >; http://rhn.redhat.com/errata/RHSA-2004-120.html

One less now with this post for the 0 reply list >; http://www.linuxquestions.org/quest...on=norepliesall

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(4

踏月而来 2022-10-10 01:30:31

升级啊  

半衬遮猫 2022-10-10 01:30:31

http://blog.platinum.net.cn/index.php?op=ViewArticle&articleId=16&blogId=1

残龙傲雪 2022-10-10 01:30:31

3楼老大的是不是fc3?因为我不知道安装目录原来的是什么.并且我担心 万一升级不成功,我无法登录服务器就不妙了,可能只有到机房???
要不要我先启动一个telnetd服务?这样失败了还有进入通道??

半世蒼涼 2022-10-10 01:30:31

我那个方法是源码编译安装的,不会有版本依赖性
如果你怕出问题,最安全的办法是同时开一个telnet来应急

~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文