From owner-freebsd-security Mon Oct 4 2:36:39 1999 Delivered-To: freebsd-security@freebsd.org Received: from relay.rtsnet.ru (bravo.rtsnet.ru [194.247.132.8]) by hub.freebsd.org (Postfix) with ESMTP id 899D6150A1 for ; Mon, 4 Oct 1999 02:36:36 -0700 (PDT) (envelope-from igor@rtsnet.ru) Received: from shogun.rtsnet.ru (shogun.rtsnet.ru [172.16.4.32]) by relay.rtsnet.ru (Postfix) with ESMTP id 18C43198C43 for ; Mon, 4 Oct 1999 13:36:36 +0400 (MSD) Received: (from igor@localhost) by shogun.rtsnet.ru (8.9.3/8.9.3/Zynaps) id NAA13376 for freebsd-security@freebsd.org; Mon, 4 Oct 1999 13:36:35 +0400 (MSD) Date: Mon, 4 Oct 1999 13:36:35 +0400 From: Igor Vinokurov To: freebsd-security@freebsd.org Subject: ssh 1.2.27 vulnerability Message-ID: <19991004133635.A13349@shogun.rtsnet.ru> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 0.95.6i Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Hello. Can someone from FreeBSD Team prove to be true/deny presence of a problem? And if the problem is - to recommend workaround? -- Igor Vinokurov To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message