From owner-freebsd-security Tue Oct 3 12:16:15 2000 Delivered-To: freebsd-security@freebsd.org Received: from mail.gmx.net (pop.gmx.net [194.221.183.20]) by hub.freebsd.org (Postfix) with SMTP id 9590137B66C for ; Tue, 3 Oct 2000 12:16:10 -0700 (PDT) Received: (qmail 475 invoked by uid 0); 3 Oct 2000 19:16:08 -0000 Received: from p3ee21610.dip.t-dialin.net (HELO speedy.gsinet) (62.226.22.16) by mail.gmx.net with SMTP; 3 Oct 2000 19:16:08 -0000 Received: (from sittig@localhost) by speedy.gsinet (8.8.8/8.8.8) id PAA03455 for freebsd-security@freebsd.org; Tue, 3 Oct 2000 15:39:46 +0200 Date: Tue, 3 Oct 2000 15:39:46 +0200 From: Gerhard Sittig To: freebsd-security@freebsd.org Subject: Re: OpenSSH Message-ID: <20001003153946.C31338@speedy.gsinet> Mail-Followup-To: freebsd-security@freebsd.org References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 1.0i In-Reply-To: ; from roman@xpert.com on Tue, Oct 03, 2000 at 01:55:34PM +0300 Organization: System Defenestrators Inc. Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Tue, Oct 03, 2000 at 13:55 +0300, Roman Shterenzon wrote: > Hello all, > I'm going through weekly BSD security digest: > http://securityportal.com/topnews/weekly/bsd20001002.html > > What is that OpenSSH bug they're talking about? Does anyone > know of a workaround? I guess (haven't read the above doc) it's about the BugTraq thread discussed with the "scp file transfer hole" subject (turning out to be an rcp heritage). List archives are at securityfocus.com. virtually yours 82D1 9B9C 01DC 4FB4 D7B4 61BE 3F49 4F77 72DE DA76 Gerhard Sittig true | mail -s "get gpg key" Gerhard.Sittig@gmx.net -- If you don't understand or are scared by any of the above ask your parents or an adult to help you. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message