Rocksolid Light

Welcome to RetroBBS

mail  files  register  newsreader  groups  login

Message-ID:  

Egotist: A person of low taste, more interested in himself than in me. -- Ambrose Bierce


computers / comp.sys.raspberry-pi / Re: sslh exploit CVE-2022-4639

SubjectAuthor
* sslh exploit CVE-2022-4639BIG Umberto
+* Re: sslh exploit CVE-2022-4639Richard Kettlewell
|`- Re: sslh exploit CVE-2022-4639BIG Umberto
`- Re: sslh exploit CVE-2022-4639Brian Gregory

1
sslh exploit CVE-2022-4639

<uc366v$2ic50$1@dont-email.me>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=7012&group=comp.sys.raspberry-pi#7012

  copy link   Newsgroups: comp.sys.raspberry-pi
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: user@2130706432.invalid (BIG Umberto)
Newsgroups: comp.sys.raspberry-pi
Subject: sslh exploit CVE-2022-4639
Date: Tue, 22 Aug 2023 20:35:43 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 14
Message-ID: <uc366v$2ic50$1@dont-email.me>
Injection-Date: Tue, 22 Aug 2023 20:35:43 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="f37a820794d2848529ec3b8b9d048d49";
logging-data="2699424"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+an38Cuc7pa9X0nCc6HNddM+BlQqLcvPY="
User-Agent: Microsoft Outlook Express 6.00.2800.1409
Cancel-Lock: sha1:qlhjf/feBndF6AF+06/gSQ3BFM8=
 by: BIG Umberto - Tue, 22 Aug 2023 20:35 UTC

CVE-2022-4639

Description:
https://vuldb.com/?id.216497
https://nvd.nist.gov/vuln/detail/CVE-2022-4639

Patch:
https://github.com/yrutschle/sslh
https://github.com/yrutschle/sslh/commit/b19f8a6046b080e4c2e28354a58556bb26040c6f

Anyone know how patch version of sslh present into the Raspbian 10.13 (buster) on a PI3 ?

Thank.

Re: sslh exploit CVE-2022-4639

<wwv350ayyey.fsf@LkoBDZeT.terraraq.uk>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=7016&group=comp.sys.raspberry-pi#7016

  copy link   Newsgroups: comp.sys.raspberry-pi
Path: i2pn2.org!i2pn.org!news.chmurka.net!nntp.terraraq.uk!.POSTED.tunnel.sfere.anjou.terraraq.org.uk!not-for-mail
From: invalid@invalid.invalid (Richard Kettlewell)
Newsgroups: comp.sys.raspberry-pi
Subject: Re: sslh exploit CVE-2022-4639
Date: Wed, 23 Aug 2023 09:07:33 +0100
Organization: terraraq NNTP server
Message-ID: <wwv350ayyey.fsf@LkoBDZeT.terraraq.uk>
References: <uc366v$2ic50$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain
Injection-Info: innmantic.terraraq.uk; posting-host="tunnel.sfere.anjou.terraraq.org.uk:172.17.207.6";
logging-data="50957"; mail-complaints-to="usenet@innmantic.terraraq.uk"
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.1 (gnu/linux)
Cancel-Lock: sha1:B8ROF7QTjDzH3LbRu6XSSK4wYqM=
X-Face: h[Hh-7npe<<b4/eW[]sat,I3O`t8A`(ej.H!F4\8|;ih)`7{@:A~/j1}gTt4e7-n*F?.Rl^
F<\{jehn7.KrO{!7=:(@J~]<.[{>v9!1<qZY,{EJxg6?Er4Y7Ng2\Ft>Z&W?r\c.!4DXH5PWpga"ha
+r0NzP?vnz:e/knOY)PI-
X-Boydie: NO
 by: Richard Kettlewell - Wed, 23 Aug 2023 08:07 UTC

"BIG Umberto" <user@2130706432.invalid> writes:

> CVE-2022-4639
>
> Description:
> https://vuldb.com/?id.216497
> https://nvd.nist.gov/vuln/detail/CVE-2022-4639
>
> Patch:
> https://github.com/yrutschle/sslh
> https://github.com/yrutschle/sslh/commit/b19f8a6046b080e4c2e28354a58556bb26040c6f
>
>
> Anyone know how patch version of sslh present into the Raspbian 10.13
> (buster) on a PI3 ?

https://lists.rutschle.net/mailman/archives/sslh/2022-December/000753.html
suggests only v.20-rc1 is impacted.

--
https://www.greenend.org.uk/rjk/

Re: sslh exploit CVE-2022-4639

<uc4o7b$2svnd$1@dont-email.me>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=7018&group=comp.sys.raspberry-pi#7018

  copy link   Newsgroups: comp.sys.raspberry-pi
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: user@2130706432.invalid (BIG Umberto)
Newsgroups: comp.sys.raspberry-pi
Subject: Re: sslh exploit CVE-2022-4639
Date: Wed, 23 Aug 2023 10:49:15 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 12
Message-ID: <uc4o7b$2svnd$1@dont-email.me>
References: <uc366v$2ic50$1@dont-email.me> <wwv350ayyey.fsf@LkoBDZeT.terraraq.uk>
Injection-Date: Wed, 23 Aug 2023 10:49:15 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="26888db4a699a61c1c618f5f4d458e19";
logging-data="3047149"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19tUt04KzO8wxZT+ZRwqLL5sID7QTN36oQ="
User-Agent: Microsoft Outlook Express 6.00.2800.1409
Cancel-Lock: sha1:3E65AWNysJ228te/t7G5DiAGc/A=
 by: BIG Umberto - Wed, 23 Aug 2023 10:49 UTC

In date: Wed, 23 Aug 2023 10:07:33 on group: comp.sys.raspberry-pi,
Richard Kettlewell wrote:

> "BIG Umberto" <user@2130706432.invalid> writes:
>
>> CVE-2022-4639
>
> https://lists.rutschle.net/mailman/archives/sslh/2022-December/000753.html
> suggests only v.20-rc1 is impacted.

Ok. Thank!

Re: sslh exploit CVE-2022-4639

<kkq368FhrlcU1@mid.individual.net>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=7035&group=comp.sys.raspberry-pi#7035

  copy link   Newsgroups: comp.sys.raspberry-pi
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: void-invalid-dead-dontuse@email.invalid (Brian Gregory)
Newsgroups: comp.sys.raspberry-pi
Subject: Re: sslh exploit CVE-2022-4639
Date: Thu, 24 Aug 2023 23:16:40 +0100
Organization: https://www.Brian-Gregory.me.uk/
Lines: 19
Message-ID: <kkq368FhrlcU1@mid.individual.net>
References: <uc366v$2ic50$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net f2/voRTBJ/+oSk3Hn3pW5wsBHj72XsphqYZ4+1HOmqExotwguz
Cancel-Lock: sha1:udMnfm9CGaHmc+u9mPw6z4G2Ymc= sha256:eDYmomX/lL6728+tRDxx+MDFaAbXR0gidSrHmUTr2L8=
User-Agent: Mozilla Thunderbird
Content-Language: en-GB
In-Reply-To: <uc366v$2ic50$1@dont-email.me>
 by: Brian Gregory - Thu, 24 Aug 2023 22:16 UTC

On 22/08/2023 21:35, BIG Umberto wrote:
> CVE-2022-4639
>
> Description:
> https://vuldb.com/?id.216497
> https://nvd.nist.gov/vuln/detail/CVE-2022-4639
>
> Patch:
> https://github.com/yrutschle/sslh
> https://github.com/yrutschle/sslh/commit/b19f8a6046b080e4c2e28354a58556bb26040c6f
>
>
> Anyone know how patch version of sslh present into the Raspbian 10.13 (buster) on a PI3 ?

You'd have to build it from the patched source code.

--
Brian Gregory (in England).

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor