Follow

OpenSSH Privilege Separation Monitor Weakness

Description:

This is a common vulnerability found on TrustWave PCI compliance scans that many of our clients are required to get. This is because our servers are running Redhat Enterprise Linux. Redhat doesn't usually update the versions of software installed and instead chooses to patch the existing version with code that fixes notable vulnerabilities. This means that their automated system produces false positives.

We normally need to make an appeal on a client by client basis to fix this type of vulnerability. Below are the steps necessary to provide a successful appeal.

Solution:

  1. The first step is to login to the client's TrustWave control panel. You'll need to locate the the most recent scan results, usually by clicking on "Scan Results" in the left navigation menu.
  2. Click on the vulnerability in question and in the vulnerability details pane at the bottom of the screen should be a button titled "Dispute".
  3. Click the "Dispute Finding" to activate the pop-up window
  4. You'll need to select a reason, enter a title, and provide a supporting comment

Solution Details:

For vulnerability "OpenSSH Duplicate Block Denial of Service Vulnerability" enter the following details:

  1. Reason: I have a compensating control in place
  2. Title: This should be pre-populated, but change as necessary
  3. Comment: We are running Red Hat Enterprise Linux Server release 5.5 (Tikanga). According to vulnerability summary CVE-2006-5794, the package "openssh-4.3p2-10.0.fc6" fixes the problem. This server runs patch level "4.3p2-72.el5_6.3" which includes the necessary security fixes.
Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request

0 Comments

Please sign in to leave a comment.