﻿<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">
  <channel>
    <title>VTrak E5000 Discussions</title>
    <description>Latest discussions happening in the VTrak E5000 category</description>
    <link>https://forum.promise.com</link>
    <item>
      <title>Dropbear SSH Server, can it be upgraded?</title>
      <description>&lt;p&gt;We have multiple clients that have stringent audit requirements. We perform Nessus scans across all networks, including the management networks of our two new Vtrak E5800 units and ancient Vtrak E610f system. Until recently we were able to mitigate many of the security violations&amp;nbsp;by shutting down the webserver and running just e-mail and SSH services. Now we may need to shut down the SSH services to comply.&lt;/p&gt;&#xD;
&lt;p&gt;All three systems have the latest firmware installed for each system, they are now failing the following...&lt;/p&gt;&#xD;
&lt;hr&gt;&#xD;
&lt;p&gt;&lt;span style="font-size: 10pt; font-family: Helvetica; font-weight: bold; color: #ff0000;"&gt;Dropbear SSH Server &amp;lt; 2016.72 Multiple Vulnerabilities&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;p&gt;&lt;span style="font-size: 10pt; font-family: Helvetica; font-weight: bold; color: #000000;"&gt;Synopsis&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;p&gt;&lt;span style="font-size: 10pt; font-family: Helvetica; color: #000000;"&gt;The SSH service running on the remote host is affected by multiple vulnerabilities.&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;p&gt;&lt;span style="font-size: 10pt; font-family: Helvetica; font-weight: bold; color: #000000;"&gt;Description&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;p&gt;&lt;span style="font-size: 10pt; font-family: Helvetica; color: #000000;"&gt;According to its self-reported version in its banner, Dropbear SSH running on the remote host is prior to 2016.74. It is, therefore, affected by the following vulnerabilities :&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;ul&gt;&#xD;
&lt;li&gt;&lt;span style="font-size: 10pt; font-family: Helvetica; color: #000000;"&gt;A format string flaw exists due to improper handling of string format specifiers (e.g., %s and %x) in usernames and host arguments. An unauthenticated, remote attacker can exploit this to execute arbitrary code with root privileges. (CVE-2016-7406)&lt;/span&gt;&lt;/li&gt;&#xD;
&lt;li&gt;&lt;span style="font-size: 10pt; font-family: Helvetica; color: #000000;"&gt;A flaw exists in dropbearconvert due to improper handling of specially crafted OpenSSH key files. An unauthenticated, remote attacker can exploit this to execute arbitrary code. (CVE-2016-7407)&lt;/span&gt;&lt;/li&gt;&#xD;
&lt;li&gt;&lt;span style="font-size: 10pt; font-family: Helvetica; color: #000000;"&gt;A flaw exists in dbclient when handling the -m or -c arguments in scripts. An unauthenticated, remote attacker can exploit this, via a specially crafted script, to execute arbitrary code. (CVE-2016-7408)&lt;/span&gt;&lt;/li&gt;&#xD;
&lt;li&gt;&lt;span style="font-size: 10pt; font-family: Helvetica; color: #000000;"&gt;A flaw exists in dbclient or dropbear server if they are compiled with the DEBUG_TRACE option and then run using the -v switch. A local attacker can exploit this to disclose process memory. (CVE-2016-7409)&lt;/span&gt;&lt;/li&gt;&#xD;
&lt;/ul&gt;&#xD;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;&#xD;
&lt;p&gt;&lt;span style="font-size: 10pt; font-family: Helvetica; font-weight: bold; color: #000000;"&gt;See Also&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;p&gt;&lt;span style="font-size: 10pt; font-family: Helvetica; color: #000000;"&gt;https://matt.ucc.asn.au/dropbear/CHANGES&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;p&gt;&lt;span style="font-size: 10pt; font-family: Helvetica; font-weight: bold; color: #000000;"&gt;Solution&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;p&gt;&lt;span style="font-size: 10pt; font-family: Helvetica; color: #333333;"&gt;Upgrade to Dropbear SSH version 2016.74 or later.&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;p&gt;&lt;span style="font-size: 10pt; font-family: Helvetica; font-weight: bold; color: #000000;"&gt;Risk Factor&lt;/span&gt;&lt;/p&gt;&#xD;
&lt;p&gt;&lt;span style="font-size: 10pt; font-family: Helvetica; font-weight: bold; color: #ff0000;"&gt;Critical&lt;/span&gt;&amp;nbsp;&lt;/p&gt;&#xD;
&lt;hr&gt;&#xD;
&lt;p&gt;The Nessus scan also calls out an out-of-date PHP version but this can be circumvented&amp;nbsp;by shutting down the webpage services. Shutting down the SSH connection is not desirable, is it possible to upgrade the SSH server on these units to something newer?&amp;nbsp;&lt;/p&gt;</description>
      <pubDate>2018-05-29T18:39:34.5000000</pubDate>
      <link>https://forum.promise.com/thread/dropbear-ssh-server-2016-72-multiple-vulnerabilities-2016-72-multiple/</link>
    </item>
  </channel>
</rss>