From owner-freebsd-security Thu Dec 16 4: 6: 2 1999 Delivered-To: freebsd-security@freebsd.org Received: from ns1.via-net-works.net.ar (ns1.via-net-works.net.ar [200.10.100.10]) by hub.freebsd.org (Postfix) with ESMTP id 07E6814E7D for ; Thu, 16 Dec 1999 04:05:59 -0800 (PST) (envelope-from fpscha@ns1.via-net-works.net.ar) Received: (from fpscha@localhost) by ns1.via-net-works.net.ar (8.8.5/8.8.4) id JAA22894 for freebsd-security@freebsd.org; Thu, 16 Dec 1999 09:07:49 -0300 (GMT) From: Fernando Schapachnik Message-Id: <199912161207.JAA22894@ns1.via-net-works.net.ar> Subject: OpenSSH vulnerable to protocol flaw? To: freebsd-security@freebsd.org Date: Thu, 16 Dec 1999 09:06:54 -0300 (GMT) Reply-To: Fernando Schapachnik X-Mailer: ELM [version 2.4ME+ PL40 (25)] MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 8bit Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org In recent post to bugtraq, someone stated that ssh1 was vulnerable to a protocol flaw which could allow a malicious party to insert arbitrary characters in the comunication channel. Anybody knows if OpenSSH is vulnerable to this? Regards. Fernando P. Schapachnik Administración de la red VIA NET.WORKS ARGENTINA S.A. fernando@via-net-works.net.ar (54-11) 4323-3333 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message