FC3的ssh有安全漏洞,怎么办????
http://www.linuxquestions.org/questions/showthread.php?s=&threadid=306097&goto=nextoldest
竟然有这样的问题,如何办是好???
[ Fedora Core OpenSSL Exploit ] ( post #1)
According to Linux Security, the OpenSSL that comes with Fedora Core is vulnerable to attacks by false SSL handshakes that will cause a DoS to your system.
The OpenSSL toolkit provides support for secure communications between machines. OpenSSL includes a certificate management tool and shared libraries which provide various cryptographic algorithms and protocols.
For those that don't know what DoS means, the acronymn stands for: Denial Of Service.
(Basically you get locked out from the Internet because your operating system can't handle what's coming in network wise.)
If you run rkhunter on your FC system you will see a report that indeed this is true.
freshmeat.net: Project details for Rootkit Hunter
This exploit effects OpenSSL 0.9.7a which you will see is the package that installs in RedHat's Fedora Project Core 3 release.
Risk factor : High ( post #2)
If you look in http://download.fedora.redhat.com for the "update" directory for FC3, you will see not a version HIGHER than 0.9.7a but what you will see is the version that doesn't have the problem and that version is 0.9.6b.
http://www.securityspace.com/smysec...d.html?id=51126
http://www.remoteassessment.com/?op...mp;vulnid=12704
http://www.linuxsecurity.com/content/view/105849/110/
What's really strange about this issue is the fact that the alert came from RedHat over one year ago today and the problem are RedHat O/S releases. Those versions of RH were and still are:
Red Hat Desktop (v. 3)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux WS (v. 3)
The OpenSSL version from RH is also the same revision that RedHat put in their Fedora Project, Core 3 release. The alert goes on to state that RH users should run up2date immediately as this is a critical flaw and will allow servers and clients to be hacked with sensitive data stolen as a possible end result scenario. This effects all applications that use OpenSSL.
There should be a notice on the FC3 ISO download web page IMHO.....
quote:
--------------------------------------------------------------------------------
Test ID: 51126
Category: Red Hat Local Security Checks
Title: RedHat Security Advisory RHSA-2004:120
Summary: Redhat Security Advisory RHSA-2004:120
Description: The remote host is missing updates announced in advisory RHSA-2004:120.
The OpenSSL toolkit implements Secure Sockets Layer (SSL v2/v3), Transport Layer Security (TLS v1) protocols, and serves as a full-strength general purpose cryptography library.
Testing performed by the OpenSSL group using the Codenomicon TLS Test Tool uncovered a null-pointer assignment in the do_change_cipher_spec() function in OpenSSL 0.9.6c-0.9.6k and 0.9.7a-0.9.7c. A remote attacker could perform a carefully crafted SSL/TLS handshake against a server that uses the OpenSSL library in such a way as to cause OpenSSL to crash. Depending on the application this could lead to a denial of service. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0079 to this issue.......
--------------------------------------------------------------------------------
For the rest of the article click this link >; http://rhn.redhat.com/errata/RHSA-2004-120.html
One less now with this post for the 0 reply list >; http://www.linuxquestions.org/quest...on=norepliesall
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(4)
升级啊
http://blog.platinum.net.cn/index.php?op=ViewArticle&articleId=16&blogId=1
3楼老大的是不是fc3?因为我不知道安装目录原来的是什么.并且我担心 万一升级不成功,我无法登录服务器就不妙了,可能只有到机房???
要不要我先启动一个telnetd服务?这样失败了还有进入通道??
我那个方法是源码编译安装的,不会有版本依赖性
如果你怕出问题,最安全的办法是同时开一个telnet来应急