Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 17 Dec 2002 12:47:06 -0600 (CST)
From:      "Doug Poland" <doug@polands.org>
To:        <stacey@vickiandstacey.com>
Cc:        <freebsd-questions@FreeBSD.ORG>
Subject:   Re: Thought of the list: CERT Advisory CA-2002-36 Multiple Vulnerabilities in SSH Implementations
Message-ID:  <58477.63.104.35.130.1040150826.squirrel@email.polands.org>
In-Reply-To: <1040145009.58381.19.camel@localhost>
References:  <1040145009.58381.19.camel@localhost>

next in thread | previous in thread | raw e-mail | index | archive | help
FWIW, on the advisory itself, an OpenSSH author states,
"From my testing it seems that the current version of OpenSSH (3.5)
is not vulnerable to these problems, and some limited testing shows
that no version of OpenSSH is vulnerable."

-- 
Regards,
Doug

Stacey Roberts said:
> This just landed in my Inbox.
>
> Figured the list might like to be aware of this:
>
> Multiple vendors' SSH transport layer protocol implementations
> contain vulnerabilities in key exchange and initialization
>
> http://www.kb.cert.org/vuls/id/389665
>
>
> Regards,
> Stacey
> --
> Stacey Roberts
> B.Sc (HONS) Computer Science
>
> Web: www.vickiandstacey.com
>
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-questions" in the body of the message




To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?58477.63.104.35.130.1040150826.squirrel>