According to our third-party PCI scanner (conducted by Trustwave) current OpenSSH version is no longer supported.
The version of OpenSSH detected is no longer supported by the vendor.
No further security patches or upgrades will be released by the vendor
for this version, and the vendor will not evaluate this version when
investigating new vulnerability reports.
This finding is based on version information which may not have been.
The scan also references:
Local privilege escalation vulnerability present in OpenSSH before 7.4.
When sshd runs with root privileges, forwarded Unix-domain sockets
are created with root permissions. Vulnerability is related to
serverloop.c.
This finding is based on version information which may not have been
updated by previously installed patches (e.g., Red Hat "back ports").
Please submit a "Patched Service" dispute in TrustKeeper if this
vulnerability has already been patched.
CVE: CVE-2016-10010
NVD: CVE-2016-10010
CVSSv2: AV:L/AC:M/Au:N/C:C/I:C/A:C
Service: ssh
Application: opensshpenssh
Reference:
http://www.openwall.com/lists/oss-security/2016/12/19/2
and
OpenSSH before 7.2p2 allows remote attackers to bypass shell
command restrictions via manipulated X11 forwarding data.
This finding is based on version information which may not have been
updated by previously installed patches (e.g., Red Hat "back ports").
Please submit a "Patched Service" dispute in TrustKeeper if this
vulnerability has already been patched.
CVE: CVE-2016-3115
NVD: CVE-2016-3115
CVSSv2: AV:N/AC:L/Au:S/C/I/A:N
Service: ssh
Application: opensshpenssh
Reference:
http://cvsweb.openbsd.org/cgibin/
cvsweb/src/usr.bin/ssh/session.c.diff?r1=1.281&r2=1.282&f=h
Evidence:
Match: '7.2 FreeBSD-20160310' is less than or equal to '7.2p2'
The current version running on FreeBSD 11.0-RELEASE-p1 is OpenSSH_7.2p2, OpenSSL 1.0.2j-freebsd and a pkg audit shows 0 problems. Also running pkg upgrade does not show any available OpenSSH update. I'm assuming that these patches have been back ported to OpenSSH_7.2p2?
Thanks,
Tim
The version of OpenSSH detected is no longer supported by the vendor.
No further security patches or upgrades will be released by the vendor
for this version, and the vendor will not evaluate this version when
investigating new vulnerability reports.
This finding is based on version information which may not have been.
The scan also references:
Local privilege escalation vulnerability present in OpenSSH before 7.4.
When sshd runs with root privileges, forwarded Unix-domain sockets
are created with root permissions. Vulnerability is related to
serverloop.c.
This finding is based on version information which may not have been
updated by previously installed patches (e.g., Red Hat "back ports").
Please submit a "Patched Service" dispute in TrustKeeper if this
vulnerability has already been patched.
CVE: CVE-2016-10010
NVD: CVE-2016-10010
CVSSv2: AV:L/AC:M/Au:N/C:C/I:C/A:C
Service: ssh
Application: opensshpenssh
Reference:
http://www.openwall.com/lists/oss-security/2016/12/19/2
and
OpenSSH before 7.2p2 allows remote attackers to bypass shell
command restrictions via manipulated X11 forwarding data.
This finding is based on version information which may not have been
updated by previously installed patches (e.g., Red Hat "back ports").
Please submit a "Patched Service" dispute in TrustKeeper if this
vulnerability has already been patched.
CVE: CVE-2016-3115
NVD: CVE-2016-3115
CVSSv2: AV:N/AC:L/Au:S/C/I/A:N
Service: ssh
Application: opensshpenssh
Reference:
http://cvsweb.openbsd.org/cgibin/
cvsweb/src/usr.bin/ssh/session.c.diff?r1=1.281&r2=1.282&f=h
Evidence:
Match: '7.2 FreeBSD-20160310' is less than or equal to '7.2p2'
The current version running on FreeBSD 11.0-RELEASE-p1 is OpenSSH_7.2p2, OpenSSL 1.0.2j-freebsd and a pkg audit shows 0 problems. Also running pkg upgrade does not show any available OpenSSH update. I'm assuming that these patches have been back ported to OpenSSH_7.2p2?
Thanks,
Tim