Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 16 Nov 1999 16:13:34 -0500 (EST)
From:      spork <spork@super-g.com>
To:        Mike Tancsa <mike@sentex.net>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: Fwd: ssh-1.2.27 remote buffer overflow - exploitable  (VD#7) 
Message-ID:  <Pine.BSF.4.00.9911161611450.13005-100000@super-g.com>
In-Reply-To: <3.0.5.32.19991116152108.0170f850@staff.sentex.ca>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 16 Nov 1999, Mike Tancsa wrote:

> I cant help you with OpenSSH, but the patches for sshd have been commited
> to fix the exploit in question.

It seems www.ssh.fi has removed one of the patches necessary to compile
the port (fetch: patch-ssh-1.2.27-bsd.tty.chown: www.ssh.fi: HTTP server
returned error code 404).  Anyone have a copy of this that could be put up
on ftp.freebsd.org under distfiles?

Charles
 
> 	---Mike
> ------------------------------------------------------------------------
> Mike Tancsa,                          	          tel +1 519 651 3400
> Network Administrator,     			  mike@sentex.net
> Sentex Communications                 		  www.sentex.net
> Cambridge, Ontario Canada
> 
> 
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
> 



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.00.9911161611450.13005-100000>