From owner-freebsd-security Tue Sep 15 14:05:47 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id OAA02624 for freebsd-security-outgoing; Tue, 15 Sep 1998 14:05:47 -0700 (PDT) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from frmug.org (frmug-gw.frmug.org [193.56.58.252]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id OAA02565 for ; Tue, 15 Sep 1998 14:05:28 -0700 (PDT) (envelope-from roberto@keltia.freenix.fr) Received: (from uucp@localhost) by frmug.org (8.9.1/frmug-2.3/nospam) with UUCP id XAA28474 for freebsd-security@FreeBSD.ORG; Tue, 15 Sep 1998 23:05:04 +0200 (CEST) (envelope-from roberto@keltia.freenix.fr) Received: by keltia.freenix.fr (VMailer, from userid 101) id 310E31511; Tue, 15 Sep 1998 22:41:30 +0200 (CEST) Date: Tue, 15 Sep 1998 22:41:30 +0200 From: Ollivier Robert To: freebsd-security@FreeBSD.ORG Subject: Re: sshd1 safety? Message-ID: <19980915224130.A9252@keltia.freenix.fr> Mail-Followup-To: freebsd-security@FreeBSD.ORG References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 0.94.4i In-Reply-To: ; from Jesse on Mon, Sep 14, 1998 at 11:09:49PM -0700 X-Operating-System: FreeBSD 3.0-CURRENT/ELF ctm#4637 AMD-K6 MMX @ 200 MHz Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org According to Jesse: > I've recently been hearing about issues with the latest (and final) > version of ssh1 that theorectically might allow remote root (or lesser) > exploits. Is anyone aware of such issues? I did searches on various sites > such as rootshell, but didn't find any major exploits. To the best of my knowledge, 1.2.26 is immune to recent bugs. 1.2.24 and below were not. I've seen nothing on Bugtraq and other places... -- Ollivier ROBERT -=- FreeBSD: The Power to Serve! -=- roberto@keltia.freenix.fr FreeBSD keltia.freenix.fr 3.0-CURRENT #64: Fri Sep 11 23:22:44 CEST 1998 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message