From owner-freebsd-security Mon Nov 15 19:57:52 1999 Delivered-To: freebsd-security@freebsd.org Received: from rover.village.org (rover.village.org [204.144.255.49]) by hub.freebsd.org (Postfix) with ESMTP id 23ECB14C9C; Mon, 15 Nov 1999 19:57:48 -0800 (PST) (envelope-from imp@harmony.village.org) Received: from harmony.village.org (harmony.village.org [10.0.0.6]) by rover.village.org (8.9.3/8.9.3) with ESMTP id UAA01172; Mon, 15 Nov 1999 20:57:44 -0700 (MST) (envelope-from imp@harmony.village.org) Received: from harmony.village.org (localhost.village.org [127.0.0.1]) by harmony.village.org (8.9.3/8.8.3) with ESMTP id UAA01885; Mon, 15 Nov 1999 20:57:40 -0700 (MST) Message-Id: <199911160357.UAA01885@harmony.village.org> To: Mike Tancsa Subject: Re: Fwd: ssh-1.2.27 remote buffer overflow - exploitable (VD#7) Cc: freebsd-security@freebsd.org, security-officer@freebsd.org In-reply-to: Your message of "Sun, 14 Nov 1999 00:08:12 EST." <4.1.19991114000355.04d7f230@granite.sentex.ca> References: <4.1.19991114000355.04d7f230@granite.sentex.ca> Date: Mon, 15 Nov 1999 20:57:39 -0700 From: Warner Losh Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org In message <4.1.19991114000355.04d7f230@granite.sentex.ca> Mike Tancsa writes: : Is there a patch to this ? Or is openssh the way to go ? Damn. I had a patch before taking off for the weekend, but didn't have time to commit it. I'll commit it in a little bit if no one has done so already. Warner To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message