Home > Àüü±â»ç

OpenSSH Client, ¸Þ¸ð¸® Á¤º¸ ³ëÃâ Ãë¾àÁ¡ ¡®ÁÖÀÇ¡¯

ÀÔ·Â : 2016-01-15 17:02
ÆäÀ̽ººÏ º¸³»±â Æ®À§ÅÍ º¸³»±â ³×À̹ö ¹êµå º¸³»±â īī¿À ½ºÅ丮 º¸³»±â ³×À̹ö ºí·Î±× º¸³»±â
OpenSSH Client, ¸Þ¸ð¸® Á¤º¸ ³ëÃâ µî 2°³ÀÇ Ãë¾àÁ¡ ¾÷µ¥ÀÌÆ® ¹ßÇ¥

[º¸¾È´º½º ±è°æ¾Ö] OpenSSH Client¿¡¼­ ¸Þ¸ð¸® Á¤º¸ ³ëÃâ Ãë¾àÁ¡ µî 2°³ÀÇ Ãë¾àÁ¡À» ÇØ°áÇÑ º¸¾È ¾÷µ¥ÀÌÆ®¸¦ ¹ßÇ¥Çß´Ù.

¡ãCVE-2016-0777 Ãë¾àÁ¡ ¿ä¾à È­¸é(Ãâó: NIST)


ÇØ´ç Ãë¾àÁ¡Àº roamin_common.c ¾ÈÀÇ resend_bytes ÇÔ¼ö¿¡¼­ ¸Þ¸ð¸® Á¤º¸°¡ ³ëÃâ(Information leak)µÇ´Â Ãë¾àÁ¡(CVE-2016-0777)°ú roamin_common.c ¾ÈÀÇ roamin_read ÇÔ¼ö¿Í roaming_write ÇÔ¼ö¿¡¼­ Èü ¹öÆÛ¿À¹öÇ÷οì(heap-based buffer overflow)°¡ ¹ß»ýÇÏ´Â Ãë¾àÁ¡(CVE-2016-0778)ÀÌ´Ù.

¿µÇâ¹Þ´Â ¹öÀüÀº OpneSSH 5.x, 6.x, 7.x ~ 7.1p1ÀÌ´Ù.

µû¶ó¼­ ³·Àº ¹öÀü »ç¿ëÀÚ´Â OpneSSH 7.1p2 ·Î ¾÷µ¥ÀÌÆ®Çϰí, Roming ±â´ÉÀ» ºñȰ¼ºÈ­ÇØ¾ß ÇÑ´Ù.

ÀÌ¿Í °ü·Ã Á»´õ ÀÚ¼¼ÇÑ »çÇ×Àº Çѱ¹ÀÎÅͳÝÁøÈï¿ø ÀÎÅͳÝÄ§ÇØ´ëÀÀ¼¾ÅÍ¿¡ ¹®ÀÇ(±¹¹ø ¾øÀÌ 118)ÇÏ¸é µÈ´Ù.

[¿ë¾î ¼³¸í]
¹öÆÛ ¿À¹öÇ÷οì(Buffer Overflow): ƯÁ¤ ÇÁ·Î±×·¥¿¡ ÇÒ´çµÈ ¸Þ¸ð¸® ¿µ¿ªÀ» ÃʰúÇÏ´Â Å©±âÀÇ µ¥ÀÌÅ͸¦ ÀԷ½ÃÅ´À¸·Î½á ¹ß»ýÇÏ´Â Ãë¾àÁ¡

[Âü°í»çÀÌÆ®]
http://www.openssh.com/txt/release-7.1p2
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0777
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0778

[±è°æ¾Ö ±âÀÚ(boan3@boannews.com)]

<ÀúÀÛ±ÇÀÚ: º¸¾È´º½º(www.boannews.com) ¹«´ÜÀüÀç-Àç¹èÆ÷±ÝÁö>

  •  
  • 0
  • ÆäÀ̽ººÏ º¸³»±â Æ®À§ÅÍ º¸³»±â ³×À̹ö ¹êµå º¸³»±â īī¿À ½ºÅ丮 º¸³»±â ³×À̹ö ºí·Î±× º¸³»±â

  • ¡°
  •  SNS¿¡¼­µµ º¸¾È´º½º¸¦ ¹Þ¾Æº¸¼¼¿ä!! 
  • ¡±
2025 º¸¾È½ÃÀå ¹é¼­ À§Áîµð¿£¿¡½º 2018
¼³¹®Á¶»ç
SKÅÚ·¹ÄÞ ÇØÅ· »çÅ·ΠÃÖ±Ù ÀÕ½´°¡ µÇ°í ÀÖ´Â ¡®BPFµµ¾î¡¯ °ü·Ã, ¾î¶² ¼Ö·ç¼ÇÀ» »ç¿ëÁßÀΰ¡¿ä?
¾È·¦ V3 Net for Linux
¼Ò¸¸»ç Server-i
ÆÄÀÌ¿À¸µÅ© Á¡°Ë µµ±¸
À×Ä«ÀÎÅÍ³Ý Àü¿ë ¹é½Å
Æ®·»µå ¸¶ÀÌÅ©·Î ¹é½Å
±âŸ ±¹»ê(¼Ö·ç¼Ç¸íÀº ´ñ±Û·Î)
±âŸ ¿Ü»ê(¼Ö·ç¼Ç¸íÀº ´ñ±Û·Î)
»ç¿ëÇÏÁö ¾Ê´Â´Ù