First published: Mon Nov 21 2011(Updated: )
A security flaw was found in the way ssh-keysign, a ssh helper program for host based authentication, attempted to retrieve enough entropy information on configurations that lacked a built-in entropy pool in OpenSSL (a ssh-rand-helper program would be executed to retrieve the entropy from the system environment). A local attacker could use this flaw to obtain unauthorized access to host keys via ptrace(2) process trace attached to the 'ssh-rand-helper' program. References: [1] <a href="http://www.openssh.com/txt/release-5.8p2">http://www.openssh.com/txt/release-5.8p2</a> [2] <a href="http://www.openssh.com/txt/portable-keysign-rand-helper.adv">http://www.openssh.com/txt/portable-keysign-rand-helper.adv</a> [3] <a href="http://www.nessus.org/plugins/index.php?view=single&id=53841">http://www.nessus.org/plugins/index.php?view=single&id=53841</a> [4] <a href="http://www.openwall.com/lists/oss-security/2011/11/21/11">http://www.openwall.com/lists/oss-security/2011/11/21/11</a> (CVE assignment)
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | =5.4 | |
OpenSSH | =2 | |
OpenSSH | =3.8 | |
OpenSSH | =3.8.1p1 | |
OpenSSH | =4.3p2 | |
OpenSSH | =3.2.2 | |
OpenSSH | =3.1 | |
OpenSSH | =5.5 | |
OpenSSH | =3.0.2p1 | |
OpenSSH | =1.5.8 | |
OpenSSH | =5.3 | |
OpenSSH | =4.1 | |
OpenSSH | =3.8.1 | |
OpenSSH | =2.1.1 | |
OpenSSH | =3.7.1p2 | |
OpenSSH | =4.8 | |
OpenSSH | =4.9 | |
OpenSSH | =3.2.3p1 | |
OpenSSH | =3.1p1 | |
OpenSSH | =2.5.1 | |
OpenSSH | =2.9.9p2 | |
OpenSSH | =3.6.1p2 | |
OpenSSH | =3.9 | |
OpenSSH | =3.0 | |
OpenSSH | =1.2.1 | |
OpenSSH | =2.2 | |
OpenSSH | =3.2 | |
OpenSSH | =3.6 | |
OpenSSH | =4.7 | |
OpenSSH | =1.5.7 | |
OpenSSH | =1.2.3 | |
OpenSSH | =3.7 | |
OpenSSH | <=5.8 | |
OpenSSH | =4.0p1 | |
OpenSSH | =3.5p1 | |
OpenSSH | =2.3.1 | |
OpenSSH | =3.0.1p1 | |
OpenSSH | =4.4 | |
OpenSSH | =3.7.1p1 | |
OpenSSH | =2.1 | |
OpenSSH | =1.2 | |
OpenSSH | =5.2 | |
OpenSSH | =3.3 | |
OpenSSH | =3.2.2p1 | |
OpenSSH | =3.9.1p1 | |
OpenSSH | =3.0.2 | |
OpenSSH | =3.4p1 | |
OpenSSH | =3.6.1p1 | |
OpenSSH | =3.0.1 | |
OpenSSH | =2.9.9 | |
OpenSSH | =3.6.1 | |
OpenSSH | =4.1p1 | |
OpenSSH | =5.7 | |
OpenSSH | =1.2.2 | |
OpenSSH | =4.2p1 | |
OpenSSH | =4.5 | |
OpenSSH | =2.9p1 | |
OpenSSH | =2.9 | |
OpenSSH | =3.7.1 | |
OpenSSH | =1.2.27 | |
OpenSSH | =4.2 | |
OpenSSH | =2.5.2 | |
OpenSSH | =2.3 | |
OpenSSH | =3.4 | |
OpenSSH | =4.4p1 | |
OpenSSH | =4.3p1 | |
OpenSSH | =3.5 | |
OpenSSH | =2.5 | |
OpenSSH | =5.1 | |
OpenSSH | =3.0p1 | |
OpenSSH | =3.3p1 | |
OpenSSH | =5.6 | |
OpenSSH | =4.3 | |
OpenSSH | =4.0 | |
OpenSSH | =3.9.1 | |
OpenSSH | =5.0 | |
OpenSSH | =1.3 | |
OpenSSH | =2.9p2 | |
OpenSSH | =1.5 | |
OpenSSH | =4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4327 has been rated as a medium severity vulnerability due to its potential impact on host-based authentication in OpenSSH.
To fix CVE-2011-4327, update your OpenSSH to a version that includes the patch for this vulnerability.
CVE-2011-4327 affects multiple versions of OpenSSH, specifically versions from 1.2.1 up to but not including 5.8.
CVE-2011-4327 can lead to insufficient entropy in host-based authentication, potentially exposing systems to security risks.
As a workaround, consider implementing additional entropy sources or using an alternative authentication method until an update can be applied.