[nsp] SSH updates? (was: Cisco Security Advisory: Cisco OpenSSL Implementation Vulnerability)

Christopher McCrory chrismcc at pricegrabber.com
Wed Mar 17 14:30:10 EST 2004


On Wed, 2004-03-17 at 06:16, Cisco Systems Product Security Incident
Response Team wrote:
<snip>
>      * Cisco IOS - All 12.1(11)E and later IOS software crypto (56i and k2)
>        image releases in the 12.1E release train for the Cisco 7100 and 7200
>        Series Routers are affected by this vulnerability. All IOS software
>        crypto (k8, k9, and k91) image releases in the 12.2SY release train
>        for the Cisco Catalyst 6500 Series and Cisco 7600 Series Routers are
>        affected by this vulnerability. The SSH implementation in IOS is not
>        dependent on any OpenSSL code. SSH implementations in IOS do not
>        handle certificates, yet, and therefore do not use any SSL code for

SSH not *yet* handle certs.  Does this imply that there is hope for SSH
protocol v2 support in the future?

Can anyone from Cisco comment on this?



>        SSH. OpenSSL in 12.1E and 12.2SY release trains is only used for
>        providing the HTTPS and VPN Device Manager (VDM) services. This
>        vulnerability is documented in the Cisco Bug Toolkit (registered
>        customers only) as Bug ID CSCee00041. The HTTPS web service, that uses
>        the OpenSSL code, on the device is disabled by default. The no ip http
>        secure-server command may be used to disable the HTTPS web service on
>        the device, if required. The SSH and IPSec services in IOS are not
>        vulnerable to this vulnerability.
<snip>

-- 
Christopher McCrory
 "The guy that keeps the servers running"
 
chrismcc at pricegrabber.com
 http://www.pricegrabber.com
 
Let's face it, there's no Hollow Earth, no robots, and
no 'mute rays.' And even if there were, waxed paper is
no defense.  I tried it.  Only tinfoil works.



More information about the cisco-nsp mailing list