October 1st, 2006, 11:39
Busy week for security updates to FreeBSD, with OpenSSH being the latest ...

"An attacker sending specially crafted packets to sshd(8) can cause a Denial of Service by using 100% of CPU time until a connection timeout occurs. Since this attack can be performed over multiple connections simultaneously, it is possible to cause up to MaxStartups (10 by default) sshd processes to use all the CPU time they can obtain. [CVE-2006-4924]

The OpenSSH project believe that the race condition can lead to a Denial of Service or potentially remote code execution, but the FreeBSD Security Team has been unable to verify the exact impact. [CVE-2006-5051]"

Just before that, OpenSSL ...

"Servers which parse ASN1 data from untrusted sources may be vulnerable to a denial of service attack. [CVE-2006-2937]

An attacker accessing a server which uses SSL version 2 may be able to execute arbitrary code with the privileges of that server. [CVE-2006-3738]

A malicious SSL server can cause clients connecting using SSL version 2 to crash. [CVE-2006-4343]

Applications which perform public key operations using untrusted keys may be vulnerable to a denial of service attack. [CVE-2006-2940]"

If you are running system installed from a FreeBSD ISO (eg 6.1-RELEASE) with few changes to the base system, you can update your system quite easily and quickly with he freebsd-update port. In summary:portinstall freebsd-update cp /usr/local/etc/freebsd-update.conf.sample /usr/local/etc/freebsd-update.conf
Then ... freebsd-update fetch freebsd-update install You can run freebsd-update from cron to mail you messages when new updates are vailable.