OpenSSH vulnerability, is WinSCP safe?
A security vulnerability has recently been found in OpenSSH 2.3.1 through 3.3. More info here: <invalid hyperlink removed by admin>. It looks like WinSCP uses Putty 0.63+ code for SSH which I believe is susceptible. Is there any way to use an updated SSH library instead of the outdated library with the OpenSSH vulnerability?
Detailed info if link does not work:
Buffer overflow in sshd in OpenSSH 2.3.1 through 3.3 may allow remote attackers to execute arbitrary code via a large number of responses during challenge response authentication when OpenBSD is using PAM modules with interactive keyboard authentication (PAMAuthenticationViaKbdInt).
Integer overflow in sshd in OpenSSH 2.9.9 through 3.3 allows remote attackers to execute arbitrary code during challenge response authentication (ChallengeResponseAuthentication) when OpenSSH is using SKEY or BSD_AUTH authentication.
This event can be controlled using the ((ssh)) configuration options.
Detailed info if link does not work:
Buffer overflow in sshd in OpenSSH 2.3.1 through 3.3 may allow remote attackers to execute arbitrary code via a large number of responses during challenge response authentication when OpenBSD is using PAM modules with interactive keyboard authentication (PAMAuthenticationViaKbdInt).
Integer overflow in sshd in OpenSSH 2.9.9 through 3.3 allows remote attackers to execute arbitrary code during challenge response authentication (ChallengeResponseAuthentication) when OpenSSH is using SKEY or BSD_AUTH authentication.
This event can be controlled using the ((ssh)) configuration options.
Last edited by sglawson on 2016-01-20 17:25; edited 1 time in total