bugzilla-daemon at bugzilla
Jun 16, 2012, 2:56 PM
Post #1 of 1
[Bug 2019] New: After a possible buffer overflow attack sshd does not accept connections any longer.
Bug #: 2019
Summary: After a possible buffer overflow attack sshd does not
accept connections any longer.
Product: Portable OpenSSH
AssignedTo: unassigned-bugs [at] mindrot
ReportedBy: Cliff.Brown [at] NCR
We have a number of servers all around the world that are running sshd
as the only means to remotely log into the system. Our network
security department has a server 10.6.2.50 using a security program
called Regina Scan. Retina Scan periodically interrogates the systems
attempting different known attack's to see if any of the systems fail
the attack. We are then notified when this happens usually requiring
We are running into a problem where if the test is a Buffer overflow
attack then sshd resists the attack but then will not accept
connections after the attack. Since local personnel do not have the
root password so this requires powering the server off/on. This does
not always happen. Sometimes sshd recovers and continues on normally.
Below are examples of the log entries we are seeing. I don't know if
this is a bug or just a configuration problem. I have not been able to
find any solution in the readme file for 6.0 or on the web. So I am
escalating this to the group to see if I can get some direction.
15:03:03: sshd: Did not receive identification string from <IP address>
15:04:29: sshd: Bad protocol version identification ' ' from <IP
Address> 15:04:29: error: reexec socketpair: Interrupted system call
15:04:29: error: ssh_msg_recv: read: header
15:04:29: mountd: mount (version 3) attempt failed for /home2/refpos
request from <IP Address>
Subsequent messages in the log
15:06:54: sshd: error: ssh_msg_recv: read: header
15:06:54: fatal: recv_rexec_state: ssh_msg_recv failed
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
openssh-bugs mailing list
openssh-bugs [at] mindrot