AnNyung Official Homepage Home > Update [ 1.2 ]  

HOME
What is AnNyung
Documents
Packages System
White Paper
Download
Update
  . 3.x [RSS]
  . 2.x [RSS]
  . 1.3 [RSS]
  . 1.2 [RSS]
  . 1.1 [RSS]
  . 1.0 [RSS]
FAQ
Hardware
RoadMap
Gallery

  Go oops.org
  AnNyung banner 88x31

  AnNyung 1 banner 80x15
  AnNyung 2 banner 80x15
  AnNyung 3 banner 80x15
  AnNyung banner 80x15
  AnNyung banner 80x15



openssh 보안 업데이트
Web Browser 로는 FTP 접속이 불가능 합니다.

문서번호 : 1159789082
업데이트 : 2006.10.02


상세내용

4.4p1 update

CVE-2006-4924:
sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows
remote attackers to cause a denial of service (CPU consumption) via an SSH
packet that contains duplicate blocks, which is not properly handled by
the CRC compensation attack detector.

CVE-2006-5051:
Signal handler race condition in OpenSSH before 4.4 allows remote remote
attackers to cause a denial of service (crash), and possibly execute
arbitrary code if GSSAPI authentication is enabled, via unspecified vectors.


Autoupdates 지원 : 지원


update 패키지

  RPMS :

    . openssh-4.4p1-1.i686.rpm
    . openssh-clients-4.4p1-1.i686.rpm
    . openssh-server-4.4p1-1.i686.rpm

  SRPMS :

    . openssh-4.4p1-1.src.rpm


참고 : 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051



    



 Home > Update [ 1.2 ]

Copyright 2018 OOPS Development Organization 
LAST MODIFIED: 2018/04/10