Monday, August 25, 2008 2:55 PM cmosby

RedHat compromise sparks a Critical openssh security update - SANS Internet Storm Center

Published: 2008-08-22,
Last Updated: 2008-08-22 15:45:39 UTC
by Patrick Nolan (Version: 2)
0 comment(s) digg_url = 'http://isc.sans.org/diary.html?storyid=4921&rss'; digg_title = 'RedHat compromise sparks a Critical openssh security update'; digg_skin='compact'; digg_topic = 'security';

Critical: openssh security update

"Last week Red Hat detected an intrusion on certain of its computer systems and took immediate action". "In connection with the incident, the intruder was able to sign a small number of OpenSSH packages relating only to Red Hat Enterprise Linux 4  (i386 and x86_64 architectures only) and Red Hat Enterprise Linux 5 (x86_64 architecture only)".

"processes and efforts to date indicate that packages obtained by Red Hat Enterprise Linux subscribers via Red Hat Network are not at risk".

Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.5.z)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.5.z)
Red Hat Enterprise Linux WS (v. 4)

CVEs (cve.mitre.org): CVE-2007-4752

Update - RedHat OpenSSH blacklist script released

RedHat has released "shell script which lists the affected packages and can verify that none of them are installed on a system".

Keywords:
0 comment(s) Filed under: , , , ,

Comments

No Comments