Forum Discussion
OpenSSH vulnerabilties
while undergoing a security audit several vulnerabilties were deteced in our system (F5 Big IP LTM 3600 11.4.1)
It appears that we are running OpenSSH 4.3p2
The vulnerabilities were :
OpenSSH Memory corruption vulnerability- Banner
Open SSH LoginGraceTime Denail of service
SSH Server Information Disclosure
OpenSSH ChallengeResponseAuthenticated User enumeration vulnerabilty
I was wondering the best method for patching and mitigating these, any help would be appreciated.
1 Reply
- Russell_Moore_8
Nimbostratus
It is unlikely that the scan produced accurate results. As I recall the basic linux packages are from Redhat and Redhat does not increment its version numbers in a way that makes it easy to determine if you are using a version vulnerable or not. They tend to keep a version for stability and backport patches for such things. Your best bet is to get the codes for the vulnerabilities and check them on the F5 support site.
You can limit access to SSH to administrative networks which eliminates concerns over any current or undiscovered vulnerability.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com