| Summary: | libssh2 new security issue CVE-2015-1782 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | shlomif, sysadmin-bugs |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/636262/ | ||
| Whiteboard: | has_procedure advisory MGA4-64-OK MGA4-32-OK | ||
| Source RPM: | libssh2-1.4.3-5.mga5.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2015-03-11 15:08:10 CET
There is no known exploit for the vulnerability currently, thus no PoC. You can test libssh2 via curl using the sftp protocol. I used it to download a small text file from a remote machine, like this: curl -u david -k sftp://192.168.0.4/~/foo.ldif The -u option sets the remote user name you are connecting with. The -k option is needed unless the remote machine's SSL certificate for the SSH service is signed by a recognized CA (hint, it's not, so you need this option). The 192.168.0.4 is the remote machine (can be a hostname or IP), the ~ in the URL means the user's home directory, and foo.ldif is the example filename I used. I verified that this does actually use libssh2 through strace, where I saw: send(3, "SSH-2.0-libssh2_1.4.3\r\n", 23, MSG_NOSIGNAL) = 23 The curl command worked fine before and after the update. Testing complete Mageia 4 i586. Whiteboard:
(none) =>
has_procedure MGA4-32-OK Works fine on a Mageia 4 x86-64 VBox VM. CC:
(none) =>
shlomif
David Walser
2015-03-11 19:18:51 CET
URL:
(none) =>
http://lwn.net/Vulnerabilities/636262/ Validating. Advisory uploaded. Please push to 4 updates Thanks Keywords:
(none) =>
validated_update An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0107.html Status:
NEW =>
RESOLVED |